Author: JT Smith
‘Pure’ vs. ‘commercial’ Debian
Author: JT Smith
Category:
- Linux
What if there was no copyright law?
Author: JT Smith
Slashdot centers around copyright law. Napster, DeCSS, the GPL; in all
of these discussions the fundamental power over which there is a struggle
derives from the law of copyright. And in all these cases, the fundamental
existence of copyright is hardly ever questioned. However, copyright is
not a law of nature. Such force as it has is a product of international treaty …”
Commentary: Elections without fraud
Author: JT Smith
way to go, to avoid the Florida Fiasco in future. But, like I said, there’s not a hope
that’ll ever happen. Too much rides on there BEING crises for those with the
power to make changes to ever make such a change.” ZDNet UK also examines the possibility of Internet voting.
Hacker research team disputes ‘hack SDMI’ results
Author: JT Smith
claims to the contrary, that practically all of the 447 entries to the ‘Hack SDMI’
challenge bounced off. This would mean all in the garden was lovely, if it weren’t for
the pesky Princeton University researchers led by Edward Felten, who stoutly
maintains that SDMI is toast, and says the Princeton team will be publishing its
results by the end of the week.”
Category:
- Linux
Yahoo president: Net growth isn’t dead
Author: JT Smith
because so many companies had withered along with Net hysteria.” Wishful thinking?
Gateway to unveil Linux-based AOL box Friday
Author: JT Smith
Category:
- Linux
Wearable computer maker chooses Crusoe
Author: JT Smith
Category:
- Unix
Red Hat names Kevin Thompson as new CFO
Author: JT Smith
Category:
- Linux
old.
Author: JT Smith
Then it happens. Susan and I both get knocked off our machines. The login
prompt flashes on our screens. Susan and I both try to log-on. I try telneting
back into the server. Nothing works. I power down the server and waited for
it to reboot. The machine boots up — and everything looks fine. Until I try to
log on.
Recent headlines jump into my mind — I must have an intruder. I rip out the
Ethernet cable, hoping I’ve disconnected in time to keep the hacker from
hosing my box. I become very angry. I ponder my next move.” From justLinux.com.