Home Search
install - search results
If you're not happy with the results, please do another search
qadmin-tmda / control SPAM with qmail and tmda
Author: JT Smith
Harry Zink writes: "For those of you who want an easy utility to help you install and administer the anti-SPAM utility TMDA,...
People of KDE: Matthias “Kalle” Dalheime
Author: JT Smith
KDE.org: "I usually run two different KDEs on two X servers on the same machine: The latest released version installed from official...
Weekly news wrap-up: France, Germany go for Open Source; North America slow to embrace...
Author: JT Smith
- By Grant Gross -
Just weeks after the U.S. government entered into settlement negotiations in the Microsoft antitrust case, a couple of...
Community contribution: Red Hat 7.2 review
Author: JT Smith
- By Dave Madeley -
I was quite excited when my copy of Red Hat 7.2 arrived, just the standard AUD$30 edition. Even...
Mandrake: ‘kernel22’ DoS vulnerability
Author: JT Smith
LinuxSecurity.com: A vulnerablity in the 2.2.19 and 2.4.11 Linux kernels could be used by local users to gain root privilages and could...
Web review: Linux knowledge, step-by-step
Author: JT Smith
- by Tina Gasperson -
If you've used Linux for any length of time, chances are you've experienced some success: configured a...
SuSE: ‘susehelp’ remote command execution vulnerability
Author: JT Smith
SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...
SuSE: ‘susehelp’ remote command execution vulnerability
Author: JT Smith
SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...
FBI’s magic revealed as old tricks
Author: JT Smith
ZDNet reports that "a new tool reportedly being developed by law enforcement agencies to remotely install surveillance programs on a suspect's computer...
NetBSD: Remote buffer overflow vulnerability in BSD line printer daemon
Author: JT Smith
NetBSD: There is an remotely exploitable buffer overrun in the printer daemon,
/usr/sbin/lpd. Remote root compromise from any host which can connect to...