Home Search

windo - search results

If you're not happy with the results, please do another search

Linux Users: Welcome to the World of Malware

Linux users are often smug about the state of their computer security, rightly criticizing Windows for its numerous security holes, but overlooking their own...

Review of ‘How Linux Works’

TBR writes "This is a very different introduction to Linux. It's unflashy, concentrates on the command-line and digs around in the internals rather than...

Red Hat email scam: Hard target or harbinger for Linux?

Author: Jay Lyman Linux devotees like to talk about the operating system and its various distributions as pretty much invulnerable to the kind of virus, worm,...

First Look: SUSE Linux Professional 9.2 beta

Author: Joe Barr Novell recently opened a limited beta of SUSE Linux Professional 9.2, and I've been using it for my work/production machine ever since...

Manufacturing pioneer saves time, money with Linux

Anonymous Reader writes "Managing Linux is a top priority for companies that are looking to open source software in the enterprise and is a...

Making vector graphics out of bitmaps with Frontline and Autotrace

Author: Preston St. Pierre Graphic designers prefer to work with vector-drawing applications because they can manipulate the shapes of the designs themselves, rather than the...

Re-branding Mozilla

Jan Stafford writes "The Web browsers made by the Mozilla Foundation are highly customizable, either on Linux, Unix or Windows. In this article, Mozilla...

E-Mail Scam Dupes Linux Users

Red Hat Inc. on Saturday warned users of an e-mail scam designed to plant malicious code on users' systems. The malicious e-mail poses as...

TimeSys Introduces TimeStorm Linux Development Kit

Guest writes "Pairs TimeSys 2.6 Linux, Advanced Real-Time Capabilities and Powerful Development Tools with 320MB/s Performance of PowerPC® Based Motorola MVME6100 Pittsburgh, PA -- October...

LinuxWorld London: Sandals and suits in symbiosis

Author: Tom Chance If previous LinuxWorld events were anything to go by, you'd imagine hackers fortifying the defences against the invading hordes of suits. But...