Home Search
for - search results
If you're not happy with the results, please do another search
Poor planning hurts online businesses
Author: JT Smith
One reason for many European ebusiness failures, says ZDNet.uk, is that only about half the companies trying to move their businesses online...
DeCSS code comes to Legoland
Author: JT Smith
Despite (or perhaps because of) MPAA efforts, the infamous DeCSS code continues to be posted all over the Net, often in places...
Stream MP3 using Linux
Author: JT Smith
Configuring Linux to stream MP3 music over a TCP/IP network is a matter of installing and configuring just two RPMs. These are...
Getting Linux in the government
Author: JT Smith
A Technocrat.net reader wonders if it might not be possible to rewrite some functions of the Linux kernel to make Linux comply...
Student’s computer confiscated
Author: JT Smith
The RIAA has had a student's computer confiscated at an American university for trading mp3s. The story from CNet.
Popular pine programme vulnerability
Author: JT Smith
SecurityFocus is reporting that a common un*x mail client is vulnerable to remote denial of service attacks. The site claims that pine...
Linux 2.4: Coding in public
Author: JT Smith
CRN has a story about the coming release of Linux 2.4: "It's not your father's way of making an operating system.
...
Using binary packages to distribute software
Author: JT Smith
Linux.com has an article on the transition in recent months away "from the traditional
...
Security hole in screen in Red Hat Linux 5.2 and earlier
Author: JT Smith
The security advisory is at LWN.net: "Screen allows the user to overload the visual bell with a text message that
can be set...
MSN billing glitch overcharges users
Author: JT Smith
MSN is overbilling
subscribers by hundreds or thousands...