Home Search

unix - search results

If you're not happy with the results, please do another search

New Hardware Disk Mirroring Device for SATA Drives

Data Protection Solutions by Arco writes "Data Protection Solutions Now Shipping EzRAID Continuous Backup RAID 1(Disk Mirroring) Device For SATA DrivesThe new EzRaid Dual...

Scratching that itch: Sander Jansen

Author: Joe Barr By day, 27-year-old Sander Jansen -- originally from Holland -- works for ESI Group in Alabama, a company that produces sophisticated software...

Win4Lin announces virtual desktop server product

Sharon Smith writes "New Product Provides ability to consolidate and serve multiple Windows Desktops from Linux Servers merging the best of Virtual Desktop and...

OpenSolaris one year on: Success or failure?

In June 2005, Sun Microsystems released core elements of its flagship Solaris operating system as open source software, making public more than five million...

Creating virtual private networks with tsocks and VTun

Author: Marc Abramowitz Virtual private networks (VPN) let remote users connect back to corporate networks over encrypted links. Many VPNs are built with proprietary technology...

froglogic Releases Qt/GUI/Web Test Tool Squish 3.0

Reginald Stadlbauer writes "Hamburg, Germany - 2006-06-12 froglogic GmbH today announced the availability of Squish 3.0. Squish is the leading GUI test tool for Qt-based applications making...

Building a heterogeneous home network for Linux and Mac OS X

Author: Kris Shaffer You can find plenty of information online about building heterogeneous networks involving Windows, but relatively little about connecting Macs with Linux PCs...

Go beyond what the desktop normally does with Tcl

Anonymous Reader writes "Most computer users interact with their workstations primarily through some form of graphical user interface (GUI). In the world of Microsoft...

Using Debconf to configure a system

Author: Bruce Byfield DebConf is best known as an annual gathering of Debian developers. But the Debian project likes the name so much that it...

Can the malware industry be trusted?

Author: Joe Barr Commentary: Internet security is big business. Microsoft Windows and Office vulnerabilities have made major contributions to making it -- and keeping...