In China the issue about the document format standard is even more complicated, because there's also the national standard UOF. Consequently, Chinese standardization organizations have to think what they need to do to proceed. Should they support a third standard, or not? How about unifying UOF with one or both of these standards?
Read more »Windows? MacOS? Ubuntu? Who Cares!
People who are really into their computers seem to love debating which operating system is best. I’m not sure why people get so heated about this topic, but I thought I would put forth my personal view on the subject: WHO CARES?!
Read more »- Login to post comments
The Lesser Apps of KDE - Office
Some may or may not know that KDE comes with its own built in Office suite known as Koffice. What even fewer people may know is what it actually contains. So in this segment about the Lesser Apps of KDE, we'll be covering Koffice, what it contains and what each part can do for you.
Read more »Linus Torvalds Debunks Con Kolivas's Stupidity; anti-Linux Trolls Everywhere Heartbroken
Previously, troll programmer Con Kolivas, in a move which resembles a staged drama, stormed off of the Linux project declaring it to be the scourge of civilization after his patch was denied inclusion. He was suddenly in 50 places at once, telling anybody who would listen a bunch of made-up b***s*** about his supposed experience.
Read more »Compiz Fusion Logo Vote
OpenCompositing.org are running a poll to choose a new logo for Compiz Fusion. Vote for your favorite new logo
Read more »- Login to post comments
RealNetworks Case Highlights Sea-Change In Patent Law
"Discerning what's obvious and what isn't when it comes to technology patents became a bit less gray last week when a federal judge in San Francisco reversed himself and abruptly dismissed a case brought against RealNetworks."
Read more »- Login to post comments
Thunderbird on a wire
Conspiracy theories are the kind of thing you exchange when you're speaking in private, preferably in person and without a lot of other people around. If you're smart about security, they are not the kind of thing you send around through e-mail program. A conspiracy theory about an e-mail program? That's another matter entirely.
Read more »- Login to post comments
Linux Treo Available Now!
Independent programmers in the community recently achieved Palm's goal of running Linux on Palm devices. Linux is an alternative interface to Palm and Windows Mobile operating systems, which allows you to control and navigate basic Palm device functions.
Read more »- Login to post comments
Acer Aspire 5710Z features Ubuntu preinstalled
Linux has always been pretty easy to get your hands on. You just pick out your favorite distro, download it and install. Piece of cake, right?
Read more »- Login to post comments
Massachusetts adopts Open XML
The Commonwealth of Massachusetts Wednesday added Open XML to its list of approved open documents formats.
Read more »- Login to post comments
Email Classification (Incl. Spam Classification) With POPFile On Ubuntu Feisty Fawn
This article shows how you can install and use POPFile to classify incoming emails on an Ubuntu Feisty Fawn desktop. It is a POP3 proxy that fetches your mails from your mail server, classifies them and passes them on to your email client.
Read more »- Login to post comments
A Taste of Haskell, A Taste of C
At OSCON last week, my favorite tutorial was Simon Peyton-Jones’s A Taste of Haskell (A Taste of Haskell presentation materials (PDF)).
Read more »- Login to post comments
rTorrent — console P2P!
In this article I’d like to describe a text-mode Bittorrent client - rTorrent. It will be helpful to people that share a computer with other household members because it allows them to download files regardless of the logged in user.
Read more »- Login to post comments
A SUCCESSFULL installation guide to VHCS2 on Debian Etch (4.0)
I’ve read a lot of manuals, how-to’s etc. describing the process of setting a Debian webserver containing the great VHCS2 control panel system.
Read more »- Login to post comments
Block brute force attacks with iptables
Since 2005 there has been an immense increase in brute force SSH attacks and though Linux is pretty secure by default, it does not stop evil programs from indefinitely trying to login with different passwords.
Read more »- Login to post comments