Home Search
bit - search results
If you're not happy with the results, please do another search
Linux Advisory Watch – December 9, 2005
Author: Benjamin D. Thomas
This week advisories were released for gdk-pixbuf, horde2, helix-player, Inkscape,
horde2, Perl, Webmin, eagle-usb, spamassassin, mailman, xpdf, libc-client, and
...
Smarty templating and presentation library for PHP
Author: Eddie Tejeda
PHP has historically been a simple scripting language used for quickly developing small web sites with dynamic content. But newer features have...
Google gets Microsoft treatment on book search efforts
Author: Jay Lyman
Microsoft and Google have engaged in a bit of role reversal when it comes to making it possible to search print books...
Spate of news from real-time Linux vendor
Real-time embedded Linux specialist FSMLabs announced two product releases and an educational discount in its December newsletter. A 2.2.1 dot-release of RTLinux adds UML...
Integrated Security Defense Systems
Anonymous Reader writes "With the growing need for security and the increased pressures to manage disparate technologies, IT managers are looking for new ways...
Protecting HTTP traffic
Anonymous Reader writes "Serious concerns are growing around the security threats associated with employees browsing the Internet. Learn why protecting HTTP traffic is integral...
Managing your mobile phone with floAt’s Mobile Agent
Author: Dmitri Popov
The modern mobile phone is a powerful device that you can use to store contacts, manage calendars, check email, and even browse...
PhpDig excels at small Web site indexing
Author: Colin Beckingham
Webmasters looking to provide search capabilities for their site would do well to try out PhpDig, a Web spider and search engine...
LISA ’05 Conference: Day 1
Author: Joe 'Zonker' Brockmeier
SAN DIEGO -- My first day at the 19th Large Installation System Administration (LISA) Conference in sunny San Diego was kind...
IPsec architectures and implementation methods
Jane Walker writes "In this excerpt of "The TCP/IP Guide," author Charles M. Kozierok explains the three different implementation architectures defined for IPsec: integrated,...