Patent news and other related topics from the news.
Read more »5 Best Free and Open-source Real-time Strategy Games for Linux
StarCraft and Red Alert are two of my favorite real-time strategy (RTS) games. Though these games are closed-source, they are still playable in Linux through Wine. Recently, I have tried a few free and open-source RTS games and was really impressed with some of them.
Read more »Maritz and Tucci’s Microsoft Slog Against VMware
An analysis of Microsoft's brutal fight against VMware, based on the very latest news reports.
Read more »- Login to post comments
Microsoft Executives Land Inside Microsoft Rivals
New 'insider' possibilities emerge as former Microsoft executives find a new home in potential Microsoft competitors.
Read more »- Login to post comments
8 Essential Applications Included by Default in Kubuntu 8.04
This article intends to select and briefly review 8 of the most useful applications which come by default with Kubuntu 8.04 'Hardy Heron' (the LTS release which comes with KDE 3.5.9), as included on the Live CD. The first which I include is Amarok, the default audio player in Kubuntu and also one of the most popular (if not the most popular) player for Linux.
Read more »Citadel: A Bastion of Groupware Functionality
The FOSS (Free/Open Source) world has inspired a large number of excellent groupware and messaging servers. These offer nice, large feature sets: shared calendars and contacts, meeting planners, e-mail, file sharing, instant messaging, and lots more.
Read more »- Login to post comments
The Linux laptop goes to school
The best way to see how a Linux laptop really works is to let someone else try it out.
Read more »- Login to post comments
Mainframe performance management: Linux adds complexity
What is mainframe performance management? In the past, neither mainframers nor non-IBM IT types would have had any difficulty in answering that question: mainframe performance management is that part of application and system management that focuses on performance, not RAS (reliability, availability, serviceability)
Read more »- Login to post comments
Can open source survive Congress?
If the House's proposed 2009 Defense Department budget is any indication, Congress may want to see more open-source software (OSS) in defense systems.
Read more »- Login to post comments
6 Offbeat Open Source Ideas Worthy of Rube Goldberg
The open source arena never fails to surprise when it comes to offbeat implementations of community-produced technologies. Put together enough eyeballs and collaboration, and unusual inventions will ensue. We've covered several examples of this phenomenon on OStatic, including open source efforts completely outside the software arena.
Read more »UK Govt screws browser choice
A firestorm is brewing over proposals issued by the UK's IT advisory body over which browsers the public sector should support. Taxpayers will be forced to change their browsing habits and computer setup to accommodate the guidelines, say web standards experts.
Read more »- Login to post comments
Fedora, Red Hat, and distributor security
On August 22, the Fedora Project released an "infrastructure report" confirming what most observers had, by then, suspected: the project had suffered a major security breach. The attacker got as far as a system used to sign packages distributed by Fedora.
Read more »Invention Stays One Step Ahead Of Anti-virus Software
Anti-virus companies play a losing game. Casting their nets wide, they catch common, malicious viruses and worms (known to the industry as “malware”), but it may take days before their software updates can prepare your computer for the next attack. By then it could be too late.
Read more »Maximizing Set Match Probability Using Perl On Linux Or Unix
A few different ways to maximize your match probability in your number pools.
Read more »- Login to post comments
Cracking Passwords
Enforcing password security with a multiple-user system can be a hassle — users all too often use inadequate passwords. john-the-ripper (also available via most distros) is a password-cracking tool that enables the identification of vulnerable passwords before someone with nefarious intentions finds the weakness.
Read more »- Login to post comments




