Home Search
windo - search results
If you're not happy with the results, please do another search
LAMP made easy with XAMPP
Author: Paul Virijevich
The LAMP (Linux, Apache, MySQL, PHP/Perl) software stack is emerging as a popular and cost-effective Web development platform. This is understandable given...
OpenOffice.org Writer vs. Microsoft Word
Author: Bruce Byfield
Several years ago, I wrote
"Opening
Up to OpenOffice.org: Finding an Alternative to Microsoft Word" -- my most quoted article. At that time OpenOffice.org...
Simpler networking good, but not to detriment of security
Author: ITMJ Reader
Re: Ian Palmer's article, "Why simplifying network security is critical," June 7, 2005:
While I agree with Mr. Palmer’s position that it is...
DB2 Universal Database Enterprise Server Edition
Anonymous Reader writes "IBM DB2 Universal Database Enterprise Server Edition is designed to meet the relational database server needs of mid- to large-size businesses....
An Interview with Bob Waldie about Open Hardware
Maria Winslow writes "I recently spoke with Bob Waldie, CEO of OpenGear, about his efforts to apply the open source model to hardware."
Link: windows-linux.com
Category:...
DShield – A community approach to intrusion detection
Author: Paul Virijevich
Analyzing firewall logs is key to understanding the threats your servers face. Knowing what the bad guys are looking for is the...
Microsoft and the Open-Source Community: Feel the Love
For several years now, there has been some rancor between die-hard Microsoft Windows advocates and proponents of Linux and other open-source tools and solutions....
New System Backup Administrator v5.2
Gerry Fallon writes "San Diego – June 20, 2005 -- Storix announced today the release of System Backup Administrator (SBA) Version 5.2. As...
TechBookReport on ‘Test Driving Linux’
TBR writes "Test Driving Linux is a fast spin around the Linux world for Windows users contemplating making the jump to the open source...
Open source hides secret data
Author: Mikael Vingaard
The art of hiding information from anyone except from the intended receiver has been used for many centuries. Hiding information by embedding...