Home Search

for - search results

If you're not happy with the results, please do another search

‘The people’ weigh in on MS case

Author: JT Smith Wired: "Thanks to a little-known piece of legislation known as the Tunney Act, the government is required to listen to people's comments...

Olliance Consulting Group to lead Open Source study

Author: JT Smith J.M. Weathersby writes: "Olliance Consulting Group has been selected by the Open-Source Software Institute (OSSI) to lead a coalition of...

Bastardo – the MySQL dolphin?

Author: JT Smith Sven writes: "Gnuheter reports the name contest for the MySQL dolphin is about to end. The most popular names submitted are Squeal...

HP: “Linux is the OS of the future in telecom”

Author: JT Smith Anonymous Reader writes: "Tomorrow at LinuxWorld, HP will unveil new Linux-based products and services for the telecommunications and network equipment provider markets, including an...

Who’s Aduva to get $14 million in financing?

Author: JT Smith - By Grant Gross - The announcement this month that Linux company Aduva had received $14 million in funding...

Dynasoft announces availability of Linux desktop Chinese environment

Author: JT Smith From LinuxPR: Dynasoft Co., Ltd. today announces that the company's flagship Linux desktop Chinese environment, Yangchunbaixue XP for...

Finally, printed documentation!

Author: JT Smith From LinuxPR: Prime Time Freeware is pleased to announce the DOSSIER series of topical document collections for...

Trustix: ‘rsync’ Security update

Author: JT Smith Trustix: "This update fixes the signed/unsigned remote exploit bug in rsync. In previous releases the rsync program contained several bugs which would...

YDL: ‘groff’ Security update

Author: JT Smith Yellow Dog: "Groff is a document formatting system. The groff preprocessor contains an exploitable buffer overflow. If groff can be invoked within the...

Conectiva: ‘openldap’ Privilege violation

Author: JT Smith Connectiva: "Thomas Fritz reported a vulnerability in the ldap server which could be exploited by remote attackers to delete attributes from an...