Home Search
utilities - search results
If you're not happy with the results, please do another search
Desktop Data Manager: Promising, but not there yet
Author: Bruce Byfield
Being mainly a GNOME user on the desktop, I have been waiting for two main utilities I can find in KDE: a...
MapGuide Open Source leads service company down new revenue streams
Author: Tina Gasperson
Spatial Integrators is a mapping services company in Spokane, Wash., that acts as a consultant for electric companies, public utilities, and other...
Text email clients revisited
Author: Joe 'Zonker' Brockmeier
Lately, I've been pining for the simplicity of a text email client. Though Sylpheed has been a reliable workhorse, I decided...
How to configure a scanner’s buttons on Linux
Author: Manolis Tzanidakis
While not perfect, support for scanners on Linux is constantly improving; just check the list of devices supported by SANE (Scanner Access...
LinuxTLE 8.0 Beta Screenshot Walkthrough
The Coding Studio writes "LinuxTLE is a community distribution developed in Thailand and targeting the Thai speaking audience. The project's latest release is a...
PortableApps Suite: Portable computing with style
Author: Dmitri Popov
While the process of creating a portable computing environment (a fancy term for a set of portable applications on a USB stick)...
Review: Stratus ftServer 4300
Author: Joe 'Zonker' Brockmeier
Lots of companies sell Linux servers, but how many promise 99.999% uptime? Not very many, but Stratus Technologies sells systems that...
SELinux: Comprehensive security at the price of usability
The benefit of SELinux is twofold. First, it replaces the user-based model with a policy-centric model. Every action, like running an application or reading...
Open-Xchange Announces Partnership with MySQL AB
Sharon Smith writes "Open-Xchange Announces Partnership with MySQL AB
Leading Linux-based Collaboration Server to Extend Database Support
TARRYTOWN, NY, December 7, 2006 – Open-Xchange Inc.,...
Firewall your applications with AppArmor
Author: Mayank Sharma
Traditional methods of securing a computer have revolved around controlling access to critical services. So, if you need to secure network applications,...