Home Search

install - search results

If you're not happy with the results, please do another search

Hardening Linux authentication and user identity

PAM is an authentication mechanism that originated on Solaris, but is used on various systems, including Linux. The Linux PAM implementation allows a system...

What you’re telling me by running Windows

Author: Jem Matzan There's a community center in my town where you can do things like take classes for a variety of interesting things, play...

Hot LyX

Author: Dave Fancella A common problem with word processors today is that they force users to deal with typesetting, a skill that is about as...

SysAdmin to SysAdmin: Getting started with Sybase Express

Author: Preston St. Pierre Maybe I'm a complete loner here, but I was tickled pink to learn that Sybase, my former employer, had released a...

The Dangers of Spyware

Scott writes "Spyware programs are applications that send information via the Internet to the creator of the spyware, or the publisher. Spyware usually consists...

Review: Firefox Preview Release

Author: Aditya Nag Linux users have a lot of choices in the Internet browser category these days, including Mozilla, Konqueror, Opera, and Epiphany, among others....

Preview: Fedora Core 3 Test 2

OSNews writes "Fedora Core 3 Test2 was released today, and so here's a chance to preview the software. I've been eager to try out...

Backing up your Linux desktop with rsync

Author: Brice Burgess Rsync is a command line utility traditionally used in synchronizing files between two computers, but rsync can also be used as an effective...

Backing up your Linux desktop with rsync

Rsync is a command line utility traditionally used in synchronizing files between two computers, but rsync can also be used as an effective backup tool....

U.S. government is moving toward OSS

Author: Tina Gasperson Is the U.S. federal government moving toward adoption of Linux and open source solutions? The answer is yes. The only question is...