Mandriva has today released Mandriva Linux 2009 RC2, the last pre-release before the final release. 2009 is a significant release, featuring KDE 4.1.1 as the default desktop, GNOME 2.24, Firefox 3, OpenOffice.org 3, kernel 2.6.27 and many more significant updates. It also comes with a redesigned installer and Mandriva Control Center.
Read more »How to catch Linux system intruders
There's no doubt that Linux is a secure operating system. However, nothing is perfect.
Read more »- Login to post comments
Symbian VP attacks Linux for mobiles
Jerry Panagrossi, VP of Symbian's North American operations, believes the Linux platform is not fit for purpose when it comes to working as a mobile phone OS
Read more »- Login to post comments
Postfix Spam Control - Address Verification
One of the best methods of restricting SPAM is to require address verification. This means that Postfix will initiate a SMTP session with the client’s server to verify that it is a legitimate address. This takes time and resources but…it a very effective way to deal with SPAM. You will need to add the reject_unverified_sender option.
Read more »- Login to post comments
How to install a monitoring system: PandoraFMS 2.0 in Ubuntu 8.04
Installing Pandora FMS 2.0 Server in Ubuntu Server 8.04
This guide is made using code from sources (valid also using tarball with latest code, like 2.0). It was made using Ubuntu 8.04 server.
- Login to post comments
Track your missing laptop with Adeona
Almost every laptop on sale today comes equipped with the Kensington security slot on the side or back, through which you can connect a theft-deterring locked steel cable. As an alternative, the free software utility Adeona won't preemptively deter theft, but it will help you track down your stolen equipment and better the chances of its recovery by police.
Read more »- Login to post comments
Command Line Tip - Verify Downloaded Files
Ever wondered what that MD5sum and SHA1sum things are when you are downloading ISO images? ....these ‘checksums’ allow you to verify that you have a complete and uncorrupted copy of a file. If you can generate the same checksum with your copy of the file, then the file must be a true copy. So, how do you verify these checksums?
Read more »- Login to post comments
How to Use more than 3GB RAM on 32-bit Ubuntu
Currently It seems that the current 32 bit editions of Ubuntu can only take advantage of 3GB (sometimes a little more) of physical memory.I am having a ubuntu desktop with 5GB RAM and i want to use all the available memory for gaming.
Read more »- Login to post comments
Securing your network with PacketFence
Network access control (NAC) aims to unify endpoint security, system authentication, and security enforcement in a more intelligent network access solution than simple firewalls.
Read more »- Login to post comments
Microsoft with/against VMware, with/against standards
Remember Brett Winterford? The guy whom Microsoft gave a free journey to Redmond (he lives far away in Australia)? The guy who writes for the already-Microsoft-biased ZDNet and soon after his visit to Redmond unleashed some outrageous articles echoing Microsoft’s accusations against IBM and ODF?
Read more »IBM Announces New Policy on Standards
IBM has just announced a new corporate policy regarding its "behavior when helping to create open technical standards".
Read more »Umit, the graphical network scanner
Umit is a user-friendly graphical interface to Nmap that lets you perform network port scanning. The utility's most useful features are its stored scan profiles and the ability to search and compare saved network scans.
Read more »- Login to post comments
Brilliant Brainstroms #28 - Teach Them Not To Use Those Exe’s!
One of the frequent problems that new Linux users have is trying to install Windows .exe files, instead of using Add/Remove or a .deb to install software. An easy way to fix this would be to prominently show the Add/Remove programs dialog after a fresh install (without a pop-up).
Read more »- Login to post comments
Pressure, progress flow at Linux Plumbers Conference
This week’s Linux Plumbers Conference in Portland was a great opportunity for many of the Linux kernel community people to get together, challenge one another, hash out some differences and hone their similarities and synergies.
Read more »- Login to post comments
Intel Buys British Linux Developer Opened Hand
Intel has snapped up British Linux house Opened Hand in another sign of the growing interest in the use of the operating system on mobile devices.
Last month, research from ABI Research said that Linux was set to take the lion's share of the market for the so-called mobile internet devices, those bigger than a cell phone but smaller than a laptop.
Read more »


