Operating systems

Whether its UNIX, Linux, OS, or Windows you favor, TechRepublic has everything you need to know to keep things running smoothly.

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    The Importance of Interconnectivity

    The Internet of Everything is bringing exciting growth to the digital world. But sometimes that growth can mean latency, bandwidth and security challenges for companies that aren’t prepared. To succeed, you’ll need to be better connected than your competitors. Read our interconnectivity infopaper to find out how tapping into our...

    Sponsored By Equinix

  • White Papers // Sep 2014

    Securing the Evolving Data Centre - eBook by Aberdeen Group

    Read this insightful report produced by Aberdeen Group to learn about the new ways that security technologies and services are evolving to offer you more visibility and control.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    Whitepaper: VMware vCloud Automation Centre Reference Architecture

    Greater efficiency. Increased agility. Improved compliance. Reduced costs. These are among the benefits that organizations moving to cloud computing can achieve when they properly consider both how they will build and how they will run their virtual and cloud infrastructure. The right architecture and the right management approach are equally...

    Sponsored By VMware APAC

  • White Papers // Sep 2014

    McAfee on Top

    AV-TEST performed a comparative review of three leading Endpoint Protection solutions to determine how they fared on proactively protecting against kernel-mode and MBR rootkits, the so called "day zero attacks". Once again, McAfee achieved the highest scores.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    The risk of “free” Endpoint Security

    Every organization has deployed anti-virus / anti-malware solutions, but how much have you actually reduced your risk? Aberdeen Group’s analysis confirms that enterprise-class endpoint protection reduces risk by 60-70% compared to the “free” solutions.

    Sponsored By White AU: McAfee/Intel

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Sponsored By IBM

  • Videos // Sep 2014

    The Elements of Innovation: Linux on POWER

    Hear directly from IBM ISV ecosystem partners about the exciting capabilities of the new POWER8 technology. Zend, CFEngine, SugarCRM, Chef Software, EnterpriseDB and SkySQL discuss how the increased performance, reliability, scalability and open source nature of this technology will spark innovation with their businesses and deliver more value to their...

    Sponsored By IBM

  • White Papers // Sep 2014

    Delivering Successful Software: The Importance of Precision, Validation, and Control

    Complexity is threatening to derail the software supply chain. The frantic pace of change, driven by mobile, cloud and the rise of the consumer, is forcing organizations into more fragmented ways of working. In this whitepaper, learn how to embrace the flexible processes required for modern software delivery, while underpinning...

    Sponsored By Micro Focus

  • White Papers // Aug 2014

    Migration Away From Windows XP: the Imperative for Change

    As many of you already know, support for Windows XP is coming to an end – but what does this really mean for your organization? Read this exclusive white paper to prepare for the end of Windows XP support.

    Sponsored By VMware

  • White Papers // Aug 2014

    The Top Virtualization Myths Debunked

    The following information brief explores some of the most commonly expressed concerns about virtualization – to help you distinguish fact from fiction. Read more..

    Sponsored By VMware

  • White Papers // Aug 2014

    NGFW Critical to SMB Network

    In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Windows Phone 8.1 in the Enterprise

    When Windows Phone 8 was first launched, the majority of its platform innovations were focused on delivering a robust end-user experience. Strong support for Microsoft productivity tools made Windows Phone an attractive option for business users, but not all enterprises were ready to fully embrace the new platform. While it...

    Sponsored By MobileIron

  • White Papers // Jul 2014

    Whitepaper: Exclusive Aberdeen Group Analyst Report

    Are your finance and HR system silos helping or hurting your organization? Read this whitepaper from analyst firm Aberdeen Group to learn about the future of strategic business management, including key drivers for unification such as reporting processes and employee management.

    Sponsored By Workday

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Sponsored By EMC

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Sponsored By Druva Software

  • White Papers // Feb 2014

    Real-world Identity and Access Management (IAM) for Unix-based Systems

    Explore the most common identity and access management (IAM) challenges facing Unix-based organizations, and learn about some easily implemented practices and technologies that can help you increase security, achieve compliance and improve operational efficiency. Read the white paper to learn how to: Use an Active Directory (AD) bridge solution...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Jan 2014

    Data Security in the Cloud

    Maintaining control over the data is paramount to cloud success. In this CSO Magazine whitepaper, learn about Cloud Computing Security Challenges, Techniques for Protecting Data in the Cloud and Strategies for Secure Transition to the Cloud.

    Sponsored By Vormetric

  • eBooks // Oct 2013

    Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.

    Sponsored By Dell Software

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Sep 2014

    Android-First Approach for Mobile Application Development

    Most of the mobile application developers develop their applications for Apple's iOS platform first, and upon its success in that operating system, release their application for Google's Android operating system. With growing market share of Android devices, improving app based revenue, easier publishing formalities, and a diverse user base, it...

    Provided By TATA Communications

  • White Papers // Sep 2014

    What You Need to Know About the Latest iOS Release

    Okemo, or iOS 8 as it is more widely known, has been released and is set to bring with it several new features for the iPhone and iPad. A lot of the changes have been focused on the UX and offering the user a seamless, natural experience. Apple has described...

    Provided By Prototype

  • White Papers // Sep 2014

    Security Elements in Distributed Mobile Architectures

    The mobile phones have emerged in order to overcome the basic need of human beings for being in contact one with each other. In time, the functionalities of such devices have evolved. And so, the users have started to use more and more online social services like Facebook, Twitter or...

    Provided By Creative Commons

  • White Papers // Sep 2014

    Protecting Stored Data on Android Devices

    The Android operating system is organized as a stack of different layers running on top of each other, each layer providing services to the layer sitting above it. According to the latest statistics, the Android has become the world's most popular operating system used for Smartphone. Not only its popularity...

    Provided By Creative Commons

  • White Papers // Sep 2014

    Rapid and Compact Generic Binary-to-BCD Conversion Circuit for Less Powerful Computational Devices

    Conversion of binary representation into BCD is a very frequently used operation in modern computers due to the exponential increase in the demand for decimal arithmetic. Decimal data processing applications have developed exponentially in recent years thus increasing the need to have hardware support for decimal arithmetic. Most conversion algorithms...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Operating Systems: Basic Concepts and Challenges Against Virtualization

    Operating Systems (OS) act as fundamentals to the basic computer systems in today's world. An OS is the communication between the software the user use and the hardware that lies underneath. Every electronic signal talks with their operating system to understand the work it has to do or the way...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    PI-RTOS: Platform Independent RTOS

    In this paper, the authors propose a real-time operating system kernel for the 32-bit Leon3 processor. A system is said to be Real Time if it is required to complete its work and deliver its services on time. In a real-time system the correctness of its output, is an important...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Building an Object Cloud Storage Service System using OpenStack Swift

    Cloud storage systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most important feature is storage is adjusted dynamically, and there won't be any worry about space...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Mobile Operating System

    Cellular telephony has had a significant worldwide rate of acceptance, by the year 2014 it is estimated that 3.5 of the 6.5 billion people in the planet will have the access to a cell phone. Smartphone devices such as iPhone, BlackBerry, and those that support the Android operating system are...

    Provided By Creative Commons

  • White Papers // Sep 2014

    Android Based Network Analyzer

    Android is an open source and Linux -based operating system mobile devices such a Smartphone and a tablet computer. Android was developed by open hand set alliance, led by Google, and other companies. Android offers a unified approach to application development for mobile devices which means developers need only develop...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.

    Sponsored By Dell Software

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Sponsored By Dell Software

  • eBooks // Oct 2013

    Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // Jan 2014

    Data Security in the Cloud

    Maintaining control over the data is paramount to cloud success. In this CSO Magazine whitepaper, learn about Cloud Computing Security Challenges, Techniques for Protecting Data in the Cloud and Strategies for Secure Transition to the Cloud.

    Sponsored By Vormetric

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Sponsored By Druva Software

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Jul 2014

    Windows Phone 8.1 in the Enterprise

    When Windows Phone 8 was first launched, the majority of its platform innovations were focused on delivering a robust end-user experience. Strong support for Microsoft productivity tools made Windows Phone an attractive option for business users, but not all enterprises were ready to fully embrace the new platform. While it...

    Sponsored By MobileIron

  • White Papers // Aug 2014

    The Top Virtualization Myths Debunked

    The following information brief explores some of the most commonly expressed concerns about virtualization – to help you distinguish fact from fiction. Read more..

    Sponsored By VMware

  • White Papers // Aug 2014

    Migration Away From Windows XP: the Imperative for Change

    As many of you already know, support for Windows XP is coming to an end – but what does this really mean for your organization? Read this exclusive white paper to prepare for the end of Windows XP support.

    Sponsored By VMware

  • White Papers // Jul 2014

    Whitepaper: Exclusive Aberdeen Group Analyst Report

    Are your finance and HR system silos helping or hurting your organization? Read this whitepaper from analyst firm Aberdeen Group to learn about the future of strategic business management, including key drivers for unification such as reporting processes and employee management.

    Sponsored By Workday

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Sponsored By EMC

  • White Papers // Feb 2014

    Real-world Identity and Access Management (IAM) for Unix-based Systems

    Explore the most common identity and access management (IAM) challenges facing Unix-based organizations, and learn about some easily implemented practices and technologies that can help you increase security, achieve compliance and improve operational efficiency. Read the white paper to learn how to: Use an Active Directory (AD) bridge solution...

    Sponsored By Dell Software

  • White Papers // Aug 2014

    NGFW Critical to SMB Network

    In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

    Sponsored By Dell Software

  • White Papers // Sep 2014

    Delivering Successful Software: The Importance of Precision, Validation, and Control

    Complexity is threatening to derail the software supply chain. The frantic pace of change, driven by mobile, cloud and the rise of the consumer, is forcing organizations into more fragmented ways of working. In this whitepaper, learn how to embrace the flexible processes required for modern software delivery, while underpinning...

    Sponsored By Micro Focus

  • White Papers // Sep 2014

    Securing the Evolving Data Centre - eBook by Aberdeen Group

    Read this insightful report produced by Aberdeen Group to learn about the new ways that security technologies and services are evolving to offer you more visibility and control.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    The Importance of Interconnectivity

    The Internet of Everything is bringing exciting growth to the digital world. But sometimes that growth can mean latency, bandwidth and security challenges for companies that aren’t prepared. To succeed, you’ll need to be better connected than your competitors. Read our interconnectivity infopaper to find out how tapping into our...

    Sponsored By Equinix

  • White Papers // Sep 2014

    Whitepaper: VMware vCloud Automation Centre Reference Architecture

    Greater efficiency. Increased agility. Improved compliance. Reduced costs. These are among the benefits that organizations moving to cloud computing can achieve when they properly consider both how they will build and how they will run their virtual and cloud infrastructure. The right architecture and the right management approach are equally...

    Sponsored By VMware APAC

  • White Papers // Sep 2014

    McAfee on Top

    AV-TEST performed a comparative review of three leading Endpoint Protection solutions to determine how they fared on proactively protecting against kernel-mode and MBR rootkits, the so called "day zero attacks". Once again, McAfee achieved the highest scores.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    The risk of “free” Endpoint Security

    Every organization has deployed anti-virus / anti-malware solutions, but how much have you actually reduced your risk? Aberdeen Group’s analysis confirms that enterprise-class endpoint protection reduces risk by 60-70% compared to the “free” solutions.

    Sponsored By White AU: McAfee/Intel

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Sponsored By IBM

  • Videos // Sep 2014

    The Elements of Innovation: Linux on POWER

    Hear directly from IBM ISV ecosystem partners about the exciting capabilities of the new POWER8 technology. Zend, CFEngine, SugarCRM, Chef Software, EnterpriseDB and SkySQL discuss how the increased performance, reliability, scalability and open source nature of this technology will spark innovation with their businesses and deliver more value to their...

    Sponsored By IBM

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • Downloads // Apr 2011

    Create a USB Flash Drive Windows Password Reset Disk

    In this edition of the Windows Desktop Report, Greg Shultz shows you how to create and use a Password Reset Disk in Windows 7 using a USB Flash Drive rather than a CD or floppy disk.

    Provided By Greg Shultz

  • White Papers // Jun 2014

    Desktop Workspace: Extending Support for Windows XP-Based Apps

    Discover how to quickly implement secure desktop containers running Windows XP on a Windows 7 or 8 PC, or even on a Mac®. You can centrally manage and tightly lock down your XP environment, and still execute locally to maintain access to those applications for as long as necessary.

    Provided By Dell Software

  • Downloads // Apr 2012

    Cheat sheet: 100 Windows keyboard shortcuts

    Navigating Microsoft Windows 8 is going to require a bit of re-training. Why not get a head start with a cheat sheet of 100 keyboard shortcuts.

    Provided By Greg Shultz

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Provided By Druva

  • Downloads // Apr 2010

    10 Linux rescue tools for recovering Linux, Windows, or Mac machines

    When you're dealing with a system that won't boot, you need a robust and dependable recovery tool. Here are a few Linux tools that might save the day.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // May 2009

    Create your own yum repository

    Vincent Danen explains how to create your own yum repository with the createrepo tool. One thing it allows you to do is to distribute specialized packages within an organization.

    Provided By Vincent Danen

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • Downloads // Oct 2009

    100 keyboard shortcuts for moving faster in Windows 7

    You don't have to experiment to find out which traditional shortcuts still work in Windows 7 -- or search for ones that have been added to the new OS. Just refer to this quick reference to speed common Windows 7 tasks.

    Provided By Greg Shultz

  • Downloads // Aug 2008

    10 quick tips to make Linux networking easier

    Linux makes networking simple and secure -- if you know a few tricks. Jack Wallen shares some pointers to help admins knock out various Linux networking tasks with a minimum of effort.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // Aug 2008

    10 fundamental differences between Linux and Windows

    Before debating the relative merits and shortcomings of Linux and Windows, it helps to understand the real distinctions between them. Jack Wallen has distilled the key differences into one list.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen