The Death of Windows

I have always regretted how Microsoft price gouges and rips off computer users. I really regret Windows XP activation. I have always intended to convert to Linux, but it isn't easy for a Windows user since version 3.0.

Recently, I purchased the book "Moving to Linux" by Marcel Gagne. The interesting thing about the book is that it includes a bootable Linux CD-ROM. "Knoppix" is a special version of Linux that you can run entirely from your CD drive. You can run Linux without uninstalling Windows or making any changes to your PC.

I tried the Knoppix CD on a Windows 2000 machine with a 200 MHz pentium II and 128 RAM, a very low power machine by today's standards. Linux provides you with step-by-step status information, and I ignored several error messages as Knoppx was booting. It took a while for Linux to boot from the 52X CD-ROM drive, but then Windows 2000 also takes forever to boot on this machine.

To my amazement, Knoppix booted successfully, with the proper screen resolution and access to all the drives. To my further amazement, the CD-ROM contained OpenOffice.org 1.0. I used OpenOffice to create a file. I couldn't save the file to the hard disk, probably because of access rights (NTFS or Linux), but I could save it to a floppy disk. Later, I opened the floppy disk file on a different Windows 2000 machine with the Windows version of OpenOffice.

In his book, Marcel Gagne gives you several tips to make knoppix start faster and work faster. For example, he provides a command that creates a Linux swap file on your Windows partition, and a command that saves Knoppix configuration to a floppy disk.

Note: If you have a broadband Internet connection, you can download Knoppix from www.knoppix.net (700 MB). You also need to know how to burn raw data to CD-R. The book gives you all kinds of information about the different Linux distributions, appications, and how to use Linux, plus the included Knoppix CD is all set to run, so I think the book is worth the extra cost.

If want you to explore and learn about Linux without uninstalling Windows or making any changes to your PC, Knoppix is the way to go. Maybe someday everyone will carry a Knoppix CD and a CD-RW to use on any computer they find. That day will truly be the death of Windows.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Copyright(C)2002 Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com. To subscribe to Bucaro TecHelp Newsletter Send a blank email to bucarotechelp.com

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

Lotus Domino/Notes - Microsoft Great Plains Tandem as ERP with Documents Workflow - Overview for IT

Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More

RFID: Strengthen the Position for SAP; United States

SAP Inc., a global leader in client/server enterprise application software... Read More

Protect Your Computer...and Your Business!

We all take the computer for granted. I mean, all... Read More

MySQL for Beginners ? How to Create a MySQL Database

Whether you are an experienced web programmer or a complete... Read More

SpyBot - Search and Destroy versus Microsoft AntiSpyware (Beta).... My personal experiences...

Ok... Where to start?Well, I guess I will start at... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

Microsoft Great Plains RW: Report Writer

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Groupware: Avoid the Ad Hoc Shuffle

GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More

What is Shareware?

Shareware is software that you can try before you buy;... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

How To Make Good Use of Spreadsheets

Most computer users use spreadsheets software such as Microsoft Excel... Read More

Microsoft Great Plains POP: Purchase Order Processing ? Overview For Consultants

Great Plains Purchase Order Processing (POP) module makes up one-third... Read More

Microsoft Great Plains & CRM in Transportation & Logistics ? Overview

Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More

Resume Software ? Advantages Revealed

The various resume software offered, particularly on the internet, can... Read More

Freight Forwarding ERP: Microsoft Business Solutions Great Plains customization & setup ? overview

Microsoft Great Plains may be recommended for international freight forwarding... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

Adware and Spyware

What is 'adware'?Adware is basically software or scripts that are... Read More

Microsoft CRM Customization - Processing In/Out-Going Email Messages

We would like to give you several situations, when you... Read More

Seven Reasons Why a Hosted Inventory Management Solution Might Be Right For Your Organization

Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More

Screenshots Vista Windows

Features Additionally, Vista will include many other new features.Aero Vista... Read More

These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

1. What determines the software price? Is it Per Seat... Read More

Microsoft Great Plains Nationwide Remote Support

ERP Consulting industry is on the way to serve clients... Read More

limousine service Ava ..