Home Search
install - search results
If you're not happy with the results, please do another search
GNOME, KDE Aim at Windows
KDE and GNOME, the open-source software projects that together form the face of most Linux installations, have undergone revisions that boost their usability...
Not Yet Another Setup Tool Anymore
Long-time Linux security specialist Immunix has produced one of the first GUIs for YaST, a text-based installation and management environment in Novell's SUSE Linux...
Linux live and kicking – Part 1
Dipping a toe in the waters of Linux can be a daunting prospect. Friendly installers on major distributions take the edge off, but...
Hardening the PAM framework
In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...
HP’s NX5000 Linux notebook: A breach of the Windows wall?
Author: Joe Barr
This article is supposed to be a review of the first PC with a Linux distribution preloaded offered by a tier-one OEM...
‘Microsoft negotiates’
Author: Robin 'Roblimo' Miller
These two words were part of a recent NewsForge headline, and to me they were the two most important words in...
Hardening the PAM framework
In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...
Thanks to Linux, this beer’s for you!
Author: Tina Gasperson
Want to send your best buddy, boss, or promising client a drink "on you" via your wireless phone? You can, if your...
Codehost Releases BrightQ Pro v2.0
Codehost Inc. writes "BrightQ Pro v2.0 makes printing from Unix and Linux more powerful and seamless than everCULVER CITY, CA September 21, 2004 –...
Hardening Linux authentication and user identity
PAM is an authentication mechanism that originated on Solaris, but is used on various systems, including Linux. The Linux PAM implementation allows a system...