Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] How GNU/Linux Beats Windows on Deprived/Weak Hardware

  • Subject: [News] How GNU/Linux Beats Windows on Deprived/Weak Hardware
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Sun, 21 Feb 2010 02:12:40 +0000
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
Hash: SHA1

Resource Hogs

,----[Quote  ]
| My people are running XP in 256MB with a 
| serious over-commit to virtual memory. I can 
| run 12 users at once and services in 1024 MB 
| with GNU/Linux. That would explain a lot of 
| the speed difference. My terminal server is 
| not swapping.


LemonPOS: Your Open Source Point of Sale 

,----[ Quote ]
| If your small business is looking for a solid 
| point of sale system, without so many bells 
| and whistles as to increase the learning 
| curve, LemonPOS might be just what you are 
| looking for. It's not Quickbooks POS, but it 
| will help you to get your business up and 
| running quickly and inexpensively. And, since 
| it's running on top of the Linux operating 
| system, you know it's running on top of a 
| proven, reliable system.


Alex laptop to bring Linux to the masses

,----[ Quote ]
| A new laptop aims to make it easier for anyone 
| to get online, surf the net, send emails and 
| keep in touch with friends and family.
| The Linux based 15.4-inch Alex laptop comes 
| with a suite of programs for everyday tasks 
| including office and image editing tools.



Next-generation Computer Antivirus System Developed

,----[ Quote ]
| Antivirus software on your personal computer could become a thing of the past
| thanks to a new "cloud computing" approach to malicious software detection
| developed at the University of Michigan.


Trend Micro session token insufficiently random

,----[ Quote ]
| Knowing that, brute-force attackers could predict a valid password
| authentication token substantially more quickly and then use it to log in to
| the web interface. The report says that, besides changing settings, attackers
| could also execute their own arbitrary code.

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index