Home Search
for - search results
If you're not happy with the results, please do another search
The Linux Cookbook
Author: JT Smith
xcyber writes, "The Linux Cookbook contains Tips and Techniques for Everyday Use!
Over 1,500 time-saving recipes and hints for busy modern computer users!...
ApacheWeek: Threading models in Apache 2.0
Author: JT Smith
A new issue of ApacheWeek is out. Among the items: "The main topic of discussion for the last month has continued to...
Cryptographer: Sklyarov case shows business outweighs First Amendment
Author: JT Smith
- By John Leyden -
-The Register -
Noted cryptographer Bruce Schneier has produced a damning critique of the way the...
NSF to fund distributed ubercomputer
Author: JT Smith
Reuters (on ZDNet) reports that the National Science Foundation will spend $53 million to build a massive computing grid for scientific research....
Alan Cox: Linux 2.4.7-ac11
Author: JT Smith
ftp://ftp.kernel.org/pub/linux/kernel/people/alan/2.4/. Intermediate diffs are available from http://www.bzimage.org.2.4.7-ac11
o Fix dumb bug in the bootflag handling code ...
Metro Link ports to Micro-X to Sony PlayStation 2
Author: JT Smith
Metro Link Inc. (http://www.metrolink.com/) today announced the release of Micro-X for the SONY (http://www.sony.com) PlayStation® 2. With the PlayStation 2 becoming a...
Linux 2.2.20pre9
Author: JT Smith
" Rob Hudson pointed out that a new 2.2.20 prepatch, 2.2.20pre9, has
materialized on the kernel.org mirror sites. No announcement or changelog
...
Server OEMs bitch Itaniums run too hot
Author: JT Smith
joabj writes : "Server manufacturers have been concerned about the high heat dissipation coming from Itanium processors, according to this article in...
Linux IPsec gateways using FreeS/Wan
Author: JT Smith
LinuxSecurity: "By far the most viable VPN solution is an IPsec variant Not only is IPsec built in to IPV6, but also...
Internal IP address disclosure in IIS
Author: JT Smith
Net-Security: " e-Synergies has discovered and researched remote vulnerability in Internet Information Server from Microsoft. Successful exploitation of this vulnerability can...