Home Search
windo - search results
If you're not happy with the results, please do another search
Linux Users: Welcome to the World of Malware
Linux users are often smug about the state of their computer security, rightly criticizing Windows for its numerous security holes, but overlooking their own...
Review of ‘How Linux Works’
TBR writes "This is a very different introduction to Linux. It's unflashy, concentrates on the command-line and digs around in the internals rather than...
Red Hat email scam: Hard target or harbinger for Linux?
Author: Jay Lyman
Linux devotees like to talk about the operating system and its various
distributions as pretty much invulnerable to the kind of virus, worm,...
First Look: SUSE Linux Professional 9.2 beta
Author: Joe Barr
Novell recently opened a limited beta of SUSE Linux Professional 9.2, and I've been using it for my work/production machine ever since...
Manufacturing pioneer saves time, money with Linux
Anonymous Reader writes "Managing Linux is a top priority for companies that are looking to open source software in the enterprise and is a...
Making vector graphics out of bitmaps with Frontline and Autotrace
Author: Preston St. Pierre
Graphic designers prefer to work with vector-drawing applications because they can manipulate the shapes of the designs themselves, rather than the...
Re-branding Mozilla
Jan Stafford writes "The Web browsers made by the Mozilla Foundation are highly customizable, either on Linux, Unix or Windows. In this article, Mozilla...
E-Mail Scam Dupes Linux Users
Red Hat Inc. on Saturday warned users of an e-mail scam designed to plant malicious code on users' systems. The malicious e-mail poses as...
TimeSys Introduces TimeStorm Linux Development Kit
Guest writes "Pairs TimeSys 2.6 Linux, Advanced Real-Time Capabilities and Powerful Development Tools with 320MB/s Performance of PowerPC® Based Motorola MVME6100
Pittsburgh, PA -- October...
LinuxWorld London: Sandals and suits in symbiosis
Author: Tom Chance
If previous LinuxWorld events were anything to go by, you'd imagine hackers fortifying the defences against the invading hordes of suits. But...