Home Search
applications - search results
If you're not happy with the results, please do another search
Local startup serves Windows with Linux
Allowing multiple users to seamlessly access Windows desktop and applications remotely without the performance hit associated with thin clients is being put into production...
There are no bugs in that code!
Chuck Talk writes "There is only one major flaw in the shared source program from my viewpoint, and that is that the program does...
Hardening the PAM framework
In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...
Hardening the PAM framework
In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...
Mandrakesoft to Participate in Development of Highly Secure Open Operating System Solution
Paris, France ? September 23rd, 2004 ? An industrial consortium consisting of Bertin Technologies, Surlog, Jaluna, Mandrakesoft, and Oppida, all major European players in...
Book review: Open Source Licensing
The tricky part of following the GPL and even the BSD license comes when you want to keep some of the code private. This...
Team ASA announces Ultra Low Cost Linux Engine
Mark Murray writes "San Diego, CA -- Team ASA Inc., a manufacturer of high-performance networking and storage products, today announced the newest member in...
Hardening Linux authentication and user identity
PAM is an authentication mechanism that originated on Solaris, but is used on various systems, including Linux. The Linux PAM implementation allows a system...
Hot LyX
Author: Dave Fancella
A common problem with word processors today is that they force users to deal with typesetting, a skill that is about as...
The Dangers of Spyware
Scott writes "Spyware programs are applications that send information via the Internet to the creator of the spyware, or the publisher. Spyware usually consists...