Home Search

windo - search results

If you're not happy with the results, please do another search

The Second Commandment of system administration

Author: Brian Warshawsky Trust is a hard thing to come by in any workplace. Luckily for you, trust in your servers isn't. With the help...

Tired of supporting friends’ computers? Migrate them to GNU/Linux

Author: Jem Matzan A few months ago I moved from New York to Florida, leaving behind all of the friends and family that depended on...

My Workstation OS: VidaLinux

Author: Benjamin McGrath My computer is my life, but I'm fairly new to the world of Linux. I started with SUSE Linux 9.1 Professional. It's...

Review: CrossOver Office 4.2

Author: Jem Matzan Last month CodeWeavers Inc. released version 4.2 of its WINE-based Windows binary compatibility application, three months after the previous release. If you've...

Longhorn will run on some older PCs too

Although Microsoft is recommending that computers be pretty modern to fully run the next version of Windows, Longhorn will probably also run on a...

Free Programming Conferences

Rod McCall writes "Free Runtime Revolution Scripting Conferences 30th April Marks Launch of Fifteen Free Online Conferences.Edinburgh, Scotland, 26th April 2005Runtime Revolution (www.runrev.com) announces...

Linux to get trusted, better desktop support

Microsoft may have raised eyebrows when it announced its intentions to turn Windows into a "trustworthy" platform, but the open source Linux is set...

Lead Samba developer Jeremy Allison leaves HP for Novell

Author: Joe Barr Jeremy Allison, a lead developer on the Samba project, has left his job at Hewlett-Packard Co. in order to go to work for Novell,...

Author details benefits of Linux clusters

Peter Parker writes "Yes, you can build highly reliable and enterprise-ready Linux-based server clusters using free open source software components. Karl Kopper, author of...

Build an IDS with Snort, Shadow, and ACID

Author: Mark Alexander Bain Every organization understands the importance of using a firewall to protect its assets. But what happens if someone finds a...