Home Search

for - search results

If you're not happy with the results, please do another search

Has microsoft found a win?

Author: JT Smith Kelly McNeill writes "Since the initial introduction last week of the proposed settlement in the Microsoft antitrust trial, there have been some...

KDE wins three Linux Journal awards

Author: JT Smith KDE dot proudly reports that the KDE project has won three Linux Journal awards for best web client, best development tool, and...

Embedded Linux wins over Windows in weapons tracking

Author: JT Smith Berkeley, CA -- November 8, 2001 -- Researchers and scientists at Quantum Magnetics say the flexibility of the Linux operating system provided...

How non-programmers use documentation

Author: JT Smith Advogato: "Here are some observations about what would make documentation friendly for non-programmers. I've tried to give back to the Linux community...

Cyber-security czar snubs ID plan

Author: JT Smith Technology companies are pushing the idea of a national identity card for United States citizens and residents. According to the president's advisor...

Conectiva: w3m buffer overflow

Author: JT Smith "w3m is a text based pager with WWW capability. Ogasawara Satoshi and Kobayashi Shigehiro discovered a vulnerability in a MIME header...

Changes to the NetBSD Packages Collection in October 2001

Author: JT Smith Posted at BSD Today: "By my calculations, there were 2513 packages in the Packages Collection on November 1st, up from 2425 last...

Red Hat offers updated iptables package

Author: JT Smith A new version of iptables fixing various minor security problems and some other bugs is available.Some problems in earlier releases of iptables...

Gates: Microsoft made Open Source possible

Author: JT Smith From SeattleTimes: "Gates said there's a role for free software alongside commercial software, but the open-source ...

New FBI top 20 security problems list: MS IIS stays on top

Author: JT Smith ZDNet has a story about the SANS Institute and the FBI developing a top 20 list of common vulnerabilities...