Viruses in Linux The ways of viruses in LinuxDec 31, 2005
Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?more »
Hardware Detection Bash-based hardware detection for PCI and USBOct 31, 2005
If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.more »
Linux Flash Options A Look at Flash tools for the Linux environmentSep 30, 2005
Flash is today’s tool of choice for animated, interactive web content. But Flash and Linux are worlds colliding. We'll show you the current crop of Open Source Flash authoring solutions.more »
Admin Workshop: X Window Insider Tips: The X Window SystemAug 31, 2005
Thanks to automatic hardware detection, today’s admins rarely need to configure the X window system manually. But if you want to use X11’s excellent networking capabilities and tuning options, you will certainly benefit from some background knowledge.more »
Beagle The Beagle desktop search engineAug 31, 2005
To find files, music, messages, and photos in a single search, try this desktop tool with the power of an Internet search engine.more »
WineTools Setting Up Windows software on Linux with WineToolsAug 31, 2005
WineTools is an installation program that helps users set up Windows software on Linux without wasting time with experiments.more »
GPRS in Linux Mobile Internet access with GPRSAug 31, 2005
Permanent mobile Internet access might sound like a nightmare for some, but for others it is a dream come true. All you need is Linux and a fairly recent mobile phone.more »
Tellico Tellico Desktop DatabaseJul 31, 2005
Linux has a fantastic collection of database servers, but many users just want a simple desktop database. Tellico fills the niche.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.