Home Search

windo - search results

If you're not happy with the results, please do another search

Commentary: Why the EU ruling against Microsoft is a joke

Author: Melanie Hollands The European Union's ruling Monday against Microsoft -- a fine of €497 million for antitrust violations -- is a joke. Even if...

Witty Worm Targets Black Ice, Disables Machines

SarsSmarz writes "Remember, you can always improve Windows security by kludging on a firewall." A Slammer-like worm dubbed Witty is spreading, generating...

Linux: The Real Enterprise Choice

I just don't get it. How can people still think that Linux doesn't belong in the enterprise? Surely these people...

CBTracker: a checkbook manager for the rest of us

Author: Joe Barr Do you want to balance your checking account on your Linux desktop, but don't want to have to learn double-entry accounting in...

GFI Announces its Linux Development Plans

Release of GFI MailSecurity for Linux imminent, and more Linux products in the pipeline Hannover, Germany, 18 March 2004 - GFI, leading developer of content...

Microsoft Buying Google through AOL?

Fonze writes: Is Microsoft Eyeing AOL? Or Google?AOL has right to buy nearly 2 million Google shares OK, put the stories together, and...

The Microtek S1/D1 Digital Camera for Linux

Looking for a Linux compatible camera for less than $100? MozillaQuest Magazine reports: The photographic quality of the Microtek Take-It S1/D1 is impressive for...

Letter from CeBIT – the world’s largest IT trade show

Author: Michael 'STIBS' Stibane Every year in March in Hannover Germany, the worlds biggest geek show runs. Nearly every company with a name in...

University of Toronto conference probes FLOSS concepts, controversies, and solutions

Author: Joe Barr The University of Toronto's Knowledge Media Design Institute (KMDI) will host a multi-disciplined conference titled "Open Source and Free Software: Concepts, Controversies,...

Using key-based authentication over SSH

Author: Steve Suehring SSH, or secure shell, is a protocol by which users can remotely log in, administer, or transfer files between computers using an encrypted transport...