Home Search
environment - search results
If you're not happy with the results, please do another search
Stress testing an application with JMeter
Author: Daniel Rubio
Ever wonder how much traffic your applications can take before they start to show strains? Or what usage peaks your hardware can...
Linux Mailserver protection just got better
Mircea MITU writes "BitDefender for Mail Servers version 1.5.6 (Seraph) is out, featuring SpamTOX, the BitDefender AntiSpam.BitDefender launches the new version of the BitDefender...
MontaVista Linux Consumer Electronics 3.1 Launched
Annette Oevermann writes "MontaVista Launches Enhanced Linux Platform for Consumer Electronics
CEE 3.1 Boasts New Comprehensive DevRocket Development Environment and Several Advanced Technical Features
3GSM World...
Microsoft -v- Lindows
p2pnet.net News:- Not so long ago Lindows was something of an oddity as much because of the identity of its founder and ceo,...
EUROPE’S NEW IP LAW: “YOU JUST HAVE TO TRUST US”.
FFII is very concerned that, without better defined safeguards, the Directive will lead to a far more agressive, lawyer-driven legal environment for creative businesses;...
Linux Advisory Watch – February 20, 2004
Author: Benjamin D. Thomas
This week, advisories were
released for gnupg, kernel, mc, mutt, slocate, XFree86, gaim, freeradius, samba,
phpMyAdmin,...
Open Source CMS Solutions in Africa
Ungana Afrika News writes "Finnish Government to support Southern African
NGOs by funding an Open Source CMS project.Pretoria, South Africa, 12.2.2004 - The
Finnish government has...
Preview: Open Source in Government Conference
Author: Tony Stanco
The U.S federal government is looking at open source software in response to the E-Government Act of 2002. This year's Open Source...
New EU Directive threatens more SCO-style attacks
James Heald writes "Europe's new IP law: "you just have to trust us".The EU Parliament's Legal Affairs committee is set to rubber stamp a...
Analyzing malware
Author: Ed Skoudis
Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it...