Home Search

crack - search results

If you're not happy with the results, please do another search

Firefox 8 Cracks Down on Add-Ons

The new browser won't let new third-party add-ons run until users give the say-so, and it suggests old ones be disabled. Also: Twitter search...

Fujitsu Cracks the 10 Petaflop Barrier

Today Fujitsu today announced that the number one-ranked K computer has achieved a LINPACK benchmark performance of 10.51 petaflops (10.51 quadrillion floating point operations...

The Cracking of Kernel.org

As has recently been announced on the main kernel.org page, the main kernel.org server (known as “hera”) was recently compromised by an unknown intruder....

WASP: The Linux-Powered Flying Spy Drone that Cracks Wi-Fi & GSM Networks

Geek.com takes a peek at the Wireless Aerial Surveillance Platform (WASP), which is a repurposed US Army unmanned aerial vehicle (UAV or drone) outfitted...

Nokia’s VP Of Design Has A Plan To Crack The US Market With MeeGo,...

One look at the N8 and E7 should be enough to convince the casual observer that Nokia is serious about design. The man behind...

Block crackers with 3 locks to your SSH door

Security always requires a multi-layered scheme. SSH is a good example of this. Methods range from simple sshd configuration through the use of PAM...

SIIA Cracks Down on European Software Pirates

After years of investigating and prosecuting U.S.-based software pirates, the trade association turns its attention thieves based in Europe. Read more at internetnews.com

Opinion: HTML 5: Less Than It’s Cracked Up To Be

If you dig behind HTML 5's hype, you'll find a half-baked standard that leaves the most important questions it was meant to address unanswered...   Read...

Cracking Open Five of the Best Open Source Easter Eggs

  A number of humorous yet undocumented features are hiding beneath the surface of some of the most popular open source software applications. Although easter...

Cracked in 60 Seconds: WPA Falls

Article Source LinuxPlanetIt's been known for years that the Wired Equivalent Privacy or WEP protocol is easily broken, and that to be secure, wireless...