Home Search

live - search results

If you're not happy with the results, please do another search

The Very Best Open Source Video and Digital Music Tools

If you've used computers for any length of time, you can probably remember when watching video or streaming music was a guaranteed headache. Only...

Red Hat’s Cloud Computing Report Warns of Perils of Lock-In

For some time now, Red Hat has been pinning its future on cloud computing and virtualization--a smart move as these trends are reshaping how...

Better Video Coverage During DebConf, Thanks to Our Sponsors!

  The Debian Project is pleased to announce that, through the donations of various sponsors, it has been made a lot easier to provide interested...

Spotlight on Linux: Linvo GNU/Linux

After an earlier quick look, it seemed Linvo GNU/Linux was worthy of a spotlight. Linvo is a Slackware-based distribution featuring GNOME 2.32 and is...

Linux Foundation Releases New White Paper on FOSS Compliance for Suppliers

The Linux Foundation strives to provide relevant, useful guidance to organizations setting up their free and open source software (FOSS) compliance programs.  Last month,...

RecallMonkey Brings Simple Search to Firefox History

Where was that page you were just looking at a few days ago? If you're a Firefox user, answering that question just got a...

Distribution Release: Lightweight Portable Security 1.2.2

Lightweight Portable Security (LPS), created by USA's Department of Defence, is a small Linux live CD focusing on privacy and security while using online...

Who and What Is On My Network? Probing Your Network with Linux

In Whose Fault is it When Your Internet Dies? Troubleshooting Networks with Linux we learned some basic network troubleshooting commands. Today we're going to...

Screencasting Stars of the Linux World

Are you still taking screenshots? That is sooo last decade. Today if you want to showcase your application, your gaming skills, or even your...

Weekend Project: Keep Out Repeat Offenders with Fail2ban on Linux

Tired of automated attacks on your systems? Want to beef up security a bit by denying would-be attackers a third or fourth chance? Then...