Home Search
for - search results
If you're not happy with the results, please do another search
Corporate WAP users abandon data
Author: JT Smith
The results are in, and the latest study from market-research concern Meta Group, Inc. reveals that the number one use for WAP-enabled...
Here they come — TVs with embedded Linux
Author: JT Smith
LinuxDevices.com: Princeton Graphic Systems has begun shipping the world's first
TV with a built-in Internet Appliance subsystem. Princeton's...
maddog and roblimo to speak at Computer & Technologies show
Author: JT Smith
A Suncoast Linux Users Group press release at LinuxPR notes that Jon 'maddog' Hall and NewsForge's very own Robin 'roblimo' Miller will...
Study: Nearly 4,000 DoS attacks occur per week
Author: JT Smith
An InfoWorld article on CNN reports on the results of an Internet and computer security study conducted at the University of California,...
Security holes in Linux 6 through 7
Author: JT Smith
MSNBC carries news of updated packages for Red Hat Linux 6 through 7, fixing security holes found in the Linux kernel. Editor's...
Apple data security framework
Author: JT Smith
From Slashdot: "Apple has opened their Common Data Security Architecture framework,
which "contains an...
Borland rejoins the Mac team
Author: JT Smith
Borland is back on the Mac. After a rather long hiatus from offering development tools for Apple's Macintosh operating system, the company...
Web review: Do you Linux.ITToolbox?
Author: JT Smith
- by Tina Gasperson -
The Linux.ITToolbox looks stunningly like Yahoo! -- so much so that when I left
the window and came...
Security advisory to vixie-cron
Author: JT Smith
From LWN.net: A security hole has been discovered in the package vixie-cron. Please
update the packages in your installation as soon as...
Andamooka adds security, cryptography, and Debian books
Author: JT Smith
David Sweet writes, Andamooka, the online open content library, is proud to make the
following books available for reading, annotation, and
discussion:
Securing and...