Home Search
windo - search results
If you're not happy with the results, please do another search
Commentary: Why the EU ruling against Microsoft is a joke
Author: Melanie Hollands
The European Union's ruling Monday against Microsoft -- a fine of €497 million for antitrust violations -- is a joke. Even if...
Witty Worm Targets Black Ice, Disables Machines
SarsSmarz writes "Remember, you can always improve Windows security by kludging on a firewall."
A Slammer-like worm dubbed Witty is spreading, generating...
Linux: The Real Enterprise Choice
I just don't get it. How can people still think that Linux doesn't belong in the enterprise? Surely these people...
CBTracker: a checkbook manager for the rest of us
Author: Joe Barr
Do you want to balance your checking account on your Linux desktop, but don't want to have to learn double-entry accounting in...
GFI Announces its Linux Development Plans
Release of GFI MailSecurity for Linux imminent, and more Linux products in the pipeline
Hannover, Germany, 18 March 2004 - GFI, leading developer of content...
Microsoft Buying Google through AOL?
Fonze writes: Is Microsoft Eyeing AOL? Or Google?AOL has right to buy nearly 2 million Google shares OK, put the stories together, and...
The Microtek S1/D1 Digital Camera for Linux
Looking for a Linux compatible camera for less than $100? MozillaQuest Magazine reports: The photographic quality of the Microtek Take-It S1/D1 is impressive for...
Letter from CeBIT – the world’s largest IT trade show
Author: Michael 'STIBS' Stibane
Every year in March in Hannover Germany, the worlds biggest geek show runs. Nearly every company with a name in...
University of Toronto conference probes FLOSS concepts, controversies, and solutions
Author: Joe Barr
The University of Toronto's Knowledge Media Design Institute (KMDI) will host a multi-disciplined conference titled "Open Source and Free Software: Concepts, Controversies,...
Using key-based authentication over SSH
Author: Steve Suehring
SSH, or secure shell, is a protocol by which users can remotely log in,
administer, or transfer files between computers using an encrypted
transport...