Home Search

install - search results

If you're not happy with the results, please do another search

qadmin-tmda / control SPAM with qmail and tmda

Author: JT Smith Harry Zink writes: "For those of you who want an easy utility to help you install and administer the anti-SPAM utility TMDA,...

People of KDE: Matthias “Kalle” Dalheime

Author: JT Smith KDE.org: "I usually run two different KDEs on two X servers on the same machine: The latest released version installed from official...

Weekly news wrap-up: France, Germany go for Open Source; North America slow to embrace...

Author: JT Smith - By Grant Gross - Just weeks after the U.S. government entered into settlement negotiations in the Microsoft antitrust case, a couple of...

Community contribution: Red Hat 7.2 review

Author: JT Smith - By Dave Madeley - I was quite excited when my copy of Red Hat 7.2 arrived, just the standard AUD$30 edition. Even...

Mandrake: ‘kernel22’ DoS vulnerability

Author: JT Smith LinuxSecurity.com: A vulnerablity in the 2.2.19 and 2.4.11 Linux kernels could be used by local users to gain root privilages and could...

Web review: Linux knowledge, step-by-step

Author: JT Smith - by Tina Gasperson - If you've used Linux for any length of time, chances are you've experienced some success: configured a...

SuSE: ‘susehelp’ remote command execution vulnerability

Author: JT Smith SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...

SuSE: ‘susehelp’ remote command execution vulnerability

Author: JT Smith SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...

FBI’s magic revealed as old tricks

Author: JT Smith ZDNet reports that "a new tool reportedly being developed by law enforcement agencies to remotely install surveillance programs on a suspect's computer...

NetBSD: Remote buffer overflow vulnerability in BSD line printer daemon

Author: JT Smith NetBSD: There is an remotely exploitable buffer overrun in the printer daemon, /usr/sbin/lpd. Remote root compromise from any host which can connect to...