Home Blog Page 9823

365 node Beowulf cluster

Author: JT Smith

Linux Weekly News has an email indicating the creation of a 365 node Beowulf cluster going up in Utrecht, Holland.

Category:

  • Unix

How to secure your wireless LAN against ‘hackers’

Author: JT Smith

So, you’ve set up your shiny new wireless LAN, and you’ve had no end of fun checking your bank records and conducting company business from the bathroom. Did you give any thought to security? The Wireless Encryption Protocol may not be all the coverage you need. Read along with ZDNet and discover how to make your wireless network even more secure with the help of a free RADIUS server.

Category:

  • Linux

Say goodbye to an unlikely Internet star

Author: JT Smith

What is believed to be the first camera attached to the Internet will soon be retired. The Cambridge University’s Trojan Room Coffee Machine will go offline later this year, when the computer lab moves to a new location. Full Reuters story at ZDNet News.

Ginger: Lots of hype, lots of hot air–and that’s a good thing

Author: JT Smith

Ginger, the code-named press corps diversion for January 2001, may be full of hot air in more ways than one. Inventor Dean Kamen still won’t divulge what Ginger is or what it does, but ZDNet’s David Coursey seems to believe that “the key to Ginger may be literally hot air, used to power an ingenious, socially responsible new form of transportation.”

Debian advisory: Midnight Commander

Author: JT Smith

From a Debian security update posted to Linux Today: “It has been reported that a local user could tweak Midnight Commander of another user into executing a random program under the user id of the person running Midnight Commander. This behaviour has been fixed by Andrew V. Samoilov. We recommend you upgrade your mc package.”

Category:

  • Linux

Alan Cox: Linux kernel 2.4.2-ac14

Author: JT Smith

Alan Cox posts the latest Linux kernel update. Included in this release: IPX autocreation bug fixed, changes made to Natsemi power management, and a few more spelling fixes.

Category:

  • Linux

The Academy and the Monastery

Author: JT Smith

Linux.com posts an excerpt from the book “The Hacker Ethic and the Spirit of the Information Age,” written by Pekka Himanen, Linus Torvalds and Manuel Castells. In the chapter titled “The Academy and the Monastery,” we read about the Open Source model of software development, the birth of Linux, and the development of a hacker community.

Category:

  • Open Source

Palm buys company that binds handhelds to enterprise apps

Author: JT Smith

“Palm Inc. has agreed to acquire Extended Systems Inc., a provider of infrastructure software that allows enterprise applications to be accessed from handheld computers, in a transaction valued at about $264 million. The company is also reorganizing in the wake of the acquisition.” Read the report at Network World Fusion.

Take my NakedWife, please

Author: JT Smith

Info World reports that NakedWife, a particularly nasty Trojan worm that surfaced on Tuesday, didn’t spread far. While virus centers are calling the worm “high risk,” it appears only to have affected a small number of computers in Europe and North America.

Category:

  • Linux

Researchers outline vision of 4G wireless world

Author: JT Smith

“They’ve barely begun tackling the much-vaunted third-generation of wireless technology, called 3G, but leading companies in the industry are already laying the groundwork for what some are calling 4G. Researchers want to contribute their ideas to the development of an as-yet undefined “wireless world” that could become operational by around 2010.” Full story at Network World Fusion.