Latest LQ Deal: Linux Power User Bundle
Go Back > Blogs
User Name



Torrent Search - Torrent searching application for the Gnome desktop environment

Posted 08-18-2010 at 04:32 AM by sridhar11

Torrent Search is a torrent searching application for the Gnome desktop environment. It looks for torrent files on different websites, and allows the user to filter the results, making it very easy to find the torrent you want.

Full Story
Posted in Uncategorized
Views 526 Comments 0 sridhar11 is offline

ISP speed lies!

Posted 08-18-2010 at 03:06 AM by rich_c

I just read an article about how ISPs 'exaggerate' line speeds by claiming an average of 6.7mbps whereas the reality is around 3-4 on average. It kinda reminded me of going into an electrical store and buying some sort of HiFi/music related kit. They'll claim the amp will deliver 100 watts for example. Yeah. Peak to peak! I can't remember the exact formula for converting PP to a more 'realistic' measurement but I seem to recall the answer was somewhere around 2/3 - 1/2 of the claimed figure....
Posted in Uncategorized
Views 460 Comments 0 rich_c is offline

The Toolkit Wars 2.0: GTK+ 3.0 vs. Qt 4 vs. Clutter

Posted 08-18-2010 at 01:30 AM by Kenny_Strawn (Kenny the one-teen comittee to stamp out Proprietary $uckware)

Now that GTK+ 2.90 (a.k.a. 3.0 Beta) is out, we now have three head-to-head toolkits, all with advanced graphics, to deal with. How do these toolkits stack up? That's up to your comments.

To start it with my opinion: I would put Clutter at the top, followed by Qt and lastly GTK+. The reason for this is that Cairo (being the drawing API in GTK+) is 2D instead of 3D, and we all know that's really old fashioned. Qt in contrast actually allows for 3D acceleration while Clutter is built...
Senior Member
Posted in Uncategorized
Views 11355 Comments 16 Kenny_Strawn is offline

3 easy ways to create ridiculous passwords

Posted 08-17-2010 at 09:12 PM by sag47
Updated 08-17-2010 at 11:40 PM by sag47
Tags security

A password can be easy to create if you use the right devices to remember it.

Method number 1: use a sentence
For example your password could be a sentence:
Dictionary attacks only work if your password is a single word. For that previous password a dictionary attack wouldn't work so a cracker would either have to resort to rainbow tables or brute force.

Method number 2: start and end all passwords with the same sequence....
Senior Member
Posted in Uncategorized
Views 951 Comments 0 sag47 is offline

post 3

Posted 08-17-2010 at 06:47 PM by gnyrfta

Well, I got to about day 6 in "learnC# in 3 weeks", then I had to return the book. Now I am in a different town and they don't have the book at the library. As I am too cheap to buy it and really didn't think any of the other C# books at the library looked at all appealing, I decided to borrow "learn Java in 3 weeks" instead.

So now i am on day 5.

Java gives me a bit of a headache, but I think I will become friends with it with time.
LQ Newbie
Posted in Uncategorized
Views 483 Comments 0 gnyrfta is offline


All times are GMT -5. The time now is 10:23 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration