Home Search
windo - search results
If you're not happy with the results, please do another search
Gentoo Portage secrets
Author: Aleksey Alekseyev
Gentoo Linux is perhaps the most-used source-based Linux distribution. One secret to its success is the powerful and handy Portage package management...
Manage your movie with Celtx
Author: Joe 'Zonker' Brockmeier
Add Celtx to your software toolbox, then get ready to sign the standard "rich and famous" contract. Celtx is media pre-production...
Using phpMyAdmin
Author: Joe 'Zonker' Brockmeier
So many open source projects depend on MySQL that it's almost impossible for administrators and other open source enthusiasts to avoid...
Ubuntu LAMP Server With Torrentflux In VMware
Falko Timme writes "This tutorial is meant for Linux newbies who want to try and build a Ubuntu server box as a webserver and...
Are There Real Grounds for 64 Bits?
Start64! - Start on 64 writes "A Point Left Out of Consideration...
Recently, I have read several articles analysing the current penetration of 64-bit systems...
New Rootkits Beat BSD, Linux, OSX, AMD and Intel.
zanek writes "The new breed of rootkits is operating system-agnostic. 64-bit implementations of BSD, Linux, MacOS X, Windows Vista are all considered vulnerable, as...
Emacs tips: Customize your Emacs experience
Author: Nathan Willis
One of the principal advantages of Emacs over competing editors is how flexible and customizable it is. In fact, in several other...
Processing RAW image files on Linux
Author: Nathan Willis
The easiest way to sound like a professional when you talk about photography these days is to grumble about the deficiencies of...
Mercy Hospital opens arms to open source enterprise systems management
Author: Tina Gasperson
For almost 100 years a group of women called the Sisters of Mercy have been instilling a spirit of excellence into Baltimore's...
The Black Hat Wi-Fi exploit coverup
Author: Joe Barr
Commentary -- You've probably heard of full disclosure, the security philosophy that calls for making public all details of vulnerabilities. It has...