Home Search

for - search results

If you're not happy with the results, please do another search

The Linux Cookbook

Author: JT Smith xcyber writes, "The Linux Cookbook contains Tips and Techniques for Everyday Use! Over 1,500 time-saving recipes and hints for busy modern computer users!...

ApacheWeek: Threading models in Apache 2.0

Author: JT Smith A new issue of ApacheWeek is out. Among the items: "The main topic of discussion for the last month has continued to...

Cryptographer: Sklyarov case shows business outweighs First Amendment

Author: JT Smith - By John Leyden - -The Register - Noted cryptographer Bruce Schneier has produced a damning critique of the way the...

NSF to fund distributed ubercomputer

Author: JT Smith Reuters (on ZDNet) reports that the National Science Foundation will spend $53 million to build a massive computing grid for scientific research....

Alan Cox: Linux 2.4.7-ac11

Author: JT Smith ftp://ftp.kernel.org/pub/linux/kernel/people/alan/2.4/. Intermediate diffs are available from http://www.bzimage.org.2.4.7-ac11 o Fix dumb bug in the bootflag handling code ...

Metro Link ports to Micro-X to Sony PlayStation 2

Author: JT Smith Metro Link Inc. (http://www.metrolink.com/) today announced the release of Micro-X for the SONY (http://www.sony.com) PlayStation® 2. With the PlayStation 2 becoming a...

Linux 2.2.20pre9

Author: JT Smith " Rob Hudson pointed out that a new 2.2.20 prepatch, 2.2.20pre9, has materialized on the kernel.org mirror sites. No announcement or changelog ...

Server OEMs bitch Itaniums run too hot

Author: JT Smith joabj writes : "Server manufacturers have been concerned about the high heat dissipation coming from Itanium processors, according to this article in...

Linux IPsec gateways using FreeS/Wan

Author: JT Smith LinuxSecurity: "By far the most viable VPN solution is an IPsec variant Not only is IPsec built in to IPV6, but also...

Internal IP address disclosure in IIS

Author: JT Smith Net-Security: " e-Synergies has discovered and researched remote vulnerability in Internet Information Server from Microsoft. Successful exploitation of this vulnerability can...