Posts

Showing posts from December, 2008

Every hot woman will ask you about the time.

Women will be standing in line just to touch your watch.   Press this button

Tired of seeing disappointed faces on women when they pull down your pants.

Every time you go outside you will go with male pride.   Break into this site

YOUR LINUX TODAY NEWSLETTER FOR December 31, 200

Image
Wednesday December 31, 2008 Linux Today News WINDOWS TO UNIX WITH PUTTY AND XMING "Using PuTTY (the best Windows SSH client going) and Xming (a free X Window server for Windows) enables you to log in from a Windows box to your Unix box, and then run an X session remotely." WINDOWS 7, THE KDE 3.5 WANNABE? "Aside from the removal of some annoying Vista bells and whistles and the new Peek and Snap window-management enhancements, it is difficult not to notice the resemblance between Microsoft's much-touted revamped Aero and the excellent, now 3-years old, KDE 3.5.x." AMD RELEASES OPEN-SOURCE R600/700 3D CODE "It has taken longer than expected for AMD to complete and release this information, but it's now available. AMD has released the fundamental Linux code needed to begin fostering the development of an open-source R600 3D driver. Furthermore, this code also conce

Your Linux Today Security Letter for December 31, 2008

Image
Wednesday December 31, 2008 Linux Today Security 25C3: DAN KAMINSKY INVOKES DNSSEC "Dan Kaminsky, front man of the DNS attacks band the middle of 2008, has delivered a retrospective at the 25th annual Chaos Communication Congress (25C3) on the background and process of DNS vulnerability. But he also set his sights on the future. And outside-the-box thinker Dan J. Bernstein also had a thing or two to say." TALES FROM THE SUPPORT CRYPT "Dear Sirs: I am a client of yours. Given that I cannot disinfect my computer's DVD drive, I have enclosed it for you to clean it and send it back to me." PGP'S UNIVERSAL SERVER PROVIDES UNOBTRUSIVE ENCRYPTION "Over the last couple of weeks we've looked at the theory behind public key encryption and public key infrastructure. But how is all of this pulled together into a product that enables you to send or receive encrypted e-ma

Virtual Dr. - Securing a Wireless Home Network

Image
'); document.write(var_ddd); } //--> Wednesday, December 31, 2008 Happy New Year from everyone at Virtual Dr Join us in the Doctor's Lounge to share your greetings, well wishes and holiday cheer! Securing a Wireless Home Network One of the most important steps in establishing a networked home is to make security a priority. Our members offer some invaluable tips. OEM Hard Drives When you go shopping for a new hard drive, you're bound to come across inexpensive OEM models. Are they worth the oftentimes steep discount? Gaming Computer Recommendations A new year means new games to look forward to. Make sure your next gaming rig can handle them with these tips from our members. Whatever you do, don't close the lid! Watching digital videos or online streams on a big TV is a beautiful thing. But keeping your connected laptop's screen open can prove to be distracting, not to mention wasteful.

WebReference HTML Newsletter, Wed Dec 31 2008

Image
Wednesday December 31, 2008 Email Marketing Terms to Know When evaluating email marketing applications, it's important to know some of the buzzwords so you're properly informed. As a small business owner, you'll greatly benefit from email marketing, since it helps you stay in contact with your current or potential clients and can greatly increase sales. By Robert Burko. 1229 Search Engines 101: Paid Vs. Natural Search When people become involved in Internet marketing one of the things that comes up are the differences between natural and paid search. Both strategies have their pros and cons and can be very effective as part of a marketing strategy. By Terry Stanfield. 1222 Web 2.0 Tools While the Web has always been a tool for collaboration, only in the last few years has software permitted individuals to use it as a platform for true collab