Home Search

lin - search results

If you're not happy with the results, please do another search

Distributed computing harnesses power of the Web

Author: JT Smith The Associated Press (via CNN.com) features distributed computing programs such as SETI@home. "Distributed computing has been around for years, initially used primarily...

Red Hat’s mad as hell at Microsoft

Author: JT Smith ZD's Sm@rt Partner follows up on Red Hat's reaction to Microsoft's recent comments about Open Source being un-American. The story says a...

IBM PartnerWorld: Gerstner tells plans for IBM

Author: JT Smith InformationWeek reports on IBM chairman and CEO Lou Gerstner's keynote at PartnerWorld. He "talked about ...

Speaking in code: The quiet teen at the center of the DeCSS controversy

Author: JT Smith The Associated Press (via ABC News.com) profiles Jon Lech Johansen, who wrote the code that allows DVDs to be played on Linux...

Red Hat advisory: zope

Author: JT Smith From a Red Hat mailing list message: "This hotfix addresses and important security issue that affects Zope versions up to and including...

Surfing kernel code

Author: JT Smith Linux.com's Matt Michie writes "Even though everyone knows the Linux kernel is "free software", and that the source is open, most beginner and...

KDE 2.1: A desktop aimed at grownups

Author: JT Smith "For a long time, the headline on the KDE organization's home page was, "Is Unix ready for the desktop?" With today's release of KDE...

Opera – a viable Netscape alternative

Author: JT Smith From CanadaComputes.com: "Opera has been around for Linux for a while, but it has been a long time since I tried it. After...

2.4 kernel: Always on the go with contributor Werner Almesberger

Author: JT Smith - By Julie Bresnick - Open Source people Swiss born Austrian, Werner Almesberger first tried Linux in January of 1992. Linus Torvalds had just released...

Slackware advisory: sudo

Author: JT Smith "Sudo 1.6.3p6 is now available for Slackware 7.1 and Slackware -current. This release fixes a known buffer overflow, which could be used by malicious...