Home Search

windo - search results

If you're not happy with the results, please do another search

Microsoft desperately wants my love — and yours

Author: Robin 'Roblimo' Miller I spent December seventh, eighth, and ninth in Seattle as Microsoft's guest. Microsoft flew me there from Florida at its expense,...

Configuration: the forgotten side of security

Author: Bruce Byfield When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses...

Pepping up OOo Writer documents with sparklines

Author: Dmitri Popov Big graphs are not the only way to visualize data in a text document. Using a couple of tricks, you can spice...

Vista for Enterprise: To Adopt Or To Procrastinate

Anonymous Reader writes "It's official; Windows Vista is now available for the business customers interested in taking the… plunge. And considering the challenges, complaints...

Practical PHP and MySQL: (Negus Live Linux Series)

James Pyles writes "I recently reviewed the book that launched Prentice Hall's Negus Live Linux Series for Linux Magazine. Live Linux CDs is an...

openSUSE 10.2: the best Linux desktop yet?

Author: Joe Barr First impressions are important, and openSUSE 10.2 made a strong enough impression with me that I may be making openSUSE 10.2 my...

Hacking openSUSE 10.2

Novell's openSUSE 10.2 is an exciting desktop operating environment that includes or supports nearly every program you need for work and play. But there...

Novell-Microsoft deal an ominous development

Microsoft has intentionally rendered unsafe all but one path to heterogeneity — that being the use of Novell’s SLES (Suse Linux Enterprise Server) in...

CLI Magic: Convert file names to a different encoding with convmv

Author: Manolis Tzanidakis User Level: Beginner to intermediateRecent versions of most Linux distributions support non-English languages out of the box by using the Unicode standard....

Key-Based SSH Logins With PuTTY

Falko Timme writes "This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH...