Home Search

environment - search results

If you're not happy with the results, please do another search

Stress testing an application with JMeter

Author: Daniel Rubio Ever wonder how much traffic your applications can take before they start to show strains? Or what usage peaks your hardware can...

Linux Mailserver protection just got better

Mircea MITU writes "BitDefender for Mail Servers version 1.5.6 (Seraph) is out, featuring SpamTOX, the BitDefender AntiSpam.BitDefender launches the new version of the BitDefender...

MontaVista Linux Consumer Electronics 3.1 Launched

Annette Oevermann writes "MontaVista Launches Enhanced Linux Platform for Consumer Electronics CEE 3.1 Boasts New Comprehensive DevRocket Development Environment and Several Advanced Technical Features 3GSM World...

Microsoft -v- Lindows

p2pnet.net News:- Not so long ago Lindows was something of an oddity as much because of the identity of its founder and ceo,...

EUROPE’S NEW IP LAW: “YOU JUST HAVE TO TRUST US”.

FFII is very concerned that, without better defined safeguards, the Directive will lead to a far more agressive, lawyer-driven legal environment for creative businesses;...

Linux Advisory Watch – February 20, 2004

Author: Benjamin D. Thomas This week, advisories were released for gnupg, kernel, mc, mutt, slocate, XFree86, gaim, freeradius, samba, phpMyAdmin,...

Open Source CMS Solutions in Africa

Ungana Afrika News writes "Finnish Government to support Southern African NGOs by funding an Open Source CMS project.Pretoria, South Africa, 12.2.2004 - The Finnish government has...

Preview: Open Source in Government Conference

Author: Tony Stanco The U.S federal government is looking at open source software in response to the E-Government Act of 2002. This year's Open Source...

New EU Directive threatens more SCO-style attacks

James Heald writes "Europe's new IP law: "you just have to trust us".The EU Parliament's Legal Affairs committee is set to rubber stamp a...

Analyzing malware

Author: Ed Skoudis Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it...