Home Search
Linux - search results
If you're not happy with the results, please do another search
Tips and tricks for using two factor Authentication Technology
Single password protection techniques, while a well-used and ancient method of protecting access to information or location, are no longer something that can guarantee...
Introducing Samba 4 Now, Even More Awesomeness
Samba 4 has been in development for a long time but an official first release is imminent, the developers say. Its biggest feature is...
Playing Hide and Seek with Passwords
Passwords are used in many ways for security in computers, from BIOS management to logging in to your user account; from accessing hard disk...
Project Management with GanttProject
GanttProject is an open source task and project management tool that can display Gantt charts and PERT. It is available on Windows, Linux...
Gaming on Windows the Open Source Way!
In this article, we take a look at some of the major open source games that you can enjoy on your Microsoft Windows computer....
Funny Mythness
About Linux desktops in a business environment and virtual machines... best appreciated by experienced Linux users.
There are many myths related to Linux in...
Configuring GCC Source in Eclipse IDE
This article is aimed at developers who need to debug or experiment with the GCC source. The open source Eclipse IDE has some interesting...
Django: A Web Framework with Immense Potential
In the era of cloud computing, Web frameworks have great importance in a Web developer's life. Choosing the right one is crucial to the...
The Semester Project-IV File Systems: Formatting a Pen Drive
This article, which is a part of the series on Linux device drivers, takes the next step towards developing a file system module by...
Cyber Attacks Explained: The Botnet Army
This article covers sophisticated botnet attacks, whereby the attacked computer system becomes an attacker itself. Systems administrators and senior technology management staff that are...