TCS logo TimburyDotOrg is owned and operated by Timbury Computer Services. For over ten years, Timbury Computer Services has shown home, small business and corporate clients how to use Linux and Open Source software to maximize efficiency and lower costs.

Updates: The TimburyDotNet web hosting site redesign is complete. Linux-only hosting!More...
May
22nd

Brillo software from Google for Internet of Things

Author: It runs on Linux | Files under syndicated

Google is working on technology that could run on low-powered devices, called Brillo.


May
22nd

How to Install Prestashop with Apache2 + MySQl 5.5 + PHP 5.5 on Ubuntu Server 14.04

Author: ubuntucontrib | Files under syndicated

Prestashop is an free and open source shopping cart which has many features that make it compatible with any web server (Apache, NginX and Microsoft IIS). It is well know for its vast collection of themes as well as custom store design. Multiple paymen…


May
22nd

Mark Shuttleworth considering Canonical IPO

Author: LXer Linux News | Files under syndicated

Mark Shuttleworth, founder of Canonical and Ubuntu Linux, revealed that he’s considering taking the company public.


May
22nd

Rust 1.0.0, NASA Software Catalog, and more open source news

Author: LXer Linux News | Files under syndicated

In this week’s edition of our open source news roundup, we take a look at the release of Rust 1.0.0, NASA’s Software Catalog, and more!Open source news roundup for May 16 – 22, 2015read more


May
22nd

There’s an app for that: How NSA, allies exploit mobile app stores

Author: LXer Linux News | Files under syndicated

In 2011 and 2012, the NSA and the communications intelligence agencies of its “Five Eyes” allies developed and tested a set of add-ons to their shared Internet surveillance capability that could identify and target communications between mobile devices and popular mobile app stores—including those of Google and Samsung. According to an NSA document published by the Canadian Broadcasting Corporation, the targeting capability could have been used to launch “man-in-the-middle” attacks on mobile app downloads, allowing the NSA and other agencies to install code on targeted devices and gather intelligence on their users.


May
22nd

Systemd v220 released

Author: LXer Linux News | Files under syndicated

The long awaited systemd v220 has been released. Systemd v220 has a lot new features, improvements and bug fixes.


May
22nd

Systemd v220 released

Author: It runs on Linux | Files under syndicated

The long awaited systemd v220 has been released. Systemd v220 has a lot new features, improvements and bug fixes.


May
22nd

Getting Started with Docker on Oracle Linux

Author: Linux.com - All Content | Files under syndicated

Learn how to customize a Docker container image and use it to instantiate application instances across different Linux servers. This article describes how to create a Dockerfile, how to allocate runtime resources to containers, and how to establish a c…


May
22nd

Master and Protect PDF Documents with PDFChain on Linux

Author: Jack Wallen | Files under syndicated

Linux has a number of outstanding PDF tools. With PDFChain you can master your PDF documents (catenate, watermark, add attachments, split a document into single pages), password protect documents, and even control permissions of a document. 


May
22nd

Ubuntu PPA Management

Author: Falko Timme | Files under syndicated

PPAs or Personal Package Archives are basically software repositories that are used by Ubuntu systems for updating/upgrading activities. They contain package sets and package lists for particular Ubuntu versions. Their use is valuable for cases of indi…