Home Search

windo - search results

If you're not happy with the results, please do another search

Special Report: Managing your money with Linux

Author: Joe 'Zonker' Brockmeier If there's any job best suited for a computer, it's keeping track of finances. This week we're taking a look at...

Review: GnuCash 2.0

Author: Conrad Canterford GnuCash is a personal and small business accounting package that provides true double-entry accounting, the ability to set up automatic recurring transactions,...

Xfce 4.4 RC2 Screenshots

Michael Larabel writes "While Xfce doesn't receive nearly as much coverage in the mass media as KDE and GNOME when it comes to the...

Searchmonkey balances command-line power and desktop ease of use

Author: Bruce Byfield Searchmonkey, formerly known as Xsearch, is a graphical search tool whose main page describes it as the combining of Beagle's simplicity of...

QBrew: Home-brewed software for home brewers

Author: Brian Jones When I'm not hacking or writing about hacking, I'm brewing beer. When I say I'm brewing beer, I don't mean that I'm...

Novell talks about the Microsoft deal

Author: Joe Barr The Microsoft/Novell deal was a prime topic of conversation at my LUG meeting last night, just as it was everywhere else Linux...

Use Oracle skills to quickly learn DB2 for Linux

Anonymous Reader writes "There are many similarities between Oracle and DB2. This article shows you how to use your current knowledge of Oracle 10g...

Microsoft to do a Linux deal with Novell?

Microsoft is entering into a partnership with rival Novell involving Windows and Novell's rival Suse Linux operating system, a source familiar with the situation...

Linux interoperability takes center stage at TechX World

Author: Nathan Willis On Tuesday, upwards of 100 IT managers and administrators attended Penton Media's TechX World conference in Dallas -- the third of four...

Inside the Hacker’s Profiling Project

Author: Federico Biancuzzi Imagine being able to preview an attacker's next move based on the traces left on compromised machines. That's the aim of the...