Home Search

windo - search results

If you're not happy with the results, please do another search

Gentoo Portage secrets

Author: Aleksey Alekseyev Gentoo Linux is perhaps the most-used source-based Linux distribution. One secret to its success is the powerful and handy Portage package management...

Manage your movie with Celtx

Author: Joe 'Zonker' Brockmeier Add Celtx to your software toolbox, then get ready to sign the standard "rich and famous" contract. Celtx is media pre-production...

Using phpMyAdmin

Author: Joe 'Zonker' Brockmeier So many open source projects depend on MySQL that it's almost impossible for administrators and other open source enthusiasts to avoid...

Ubuntu LAMP Server With Torrentflux In VMware

Falko Timme writes "This tutorial is meant for Linux newbies who want to try and build a Ubuntu server box as a webserver and...

Are There Real Grounds for 64 Bits?

Start64! - Start on 64 writes "A Point Left Out of Consideration... Recently, I have read several articles analysing the current penetration of 64-bit systems...

New Rootkits Beat BSD, Linux, OSX, AMD and Intel.

zanek writes "The new breed of rootkits is operating system-agnostic. 64-bit implementations of BSD, Linux, MacOS X, Windows Vista are all considered vulnerable, as...

Emacs tips: Customize your Emacs experience

Author: Nathan Willis One of the principal advantages of Emacs over competing editors is how flexible and customizable it is. In fact, in several other...

Processing RAW image files on Linux

Author: Nathan Willis The easiest way to sound like a professional when you talk about photography these days is to grumble about the deficiencies of...

Mercy Hospital opens arms to open source enterprise systems management

Author: Tina Gasperson For almost 100 years a group of women called the Sisters of Mercy have been instilling a spirit of excellence into Baltimore's...

The Black Hat Wi-Fi exploit coverup

Author: Joe Barr Commentary -- You've probably heard of full disclosure, the security philosophy that calls for making public all details of vulnerabilities. It has...