Home Search
lin - search results
If you're not happy with the results, please do another search
Build your own PC and save
Author: JT Smith
MSNBC: "Personal computers are traditionally a popular
...
Locked down out of the box
Author: JT Smith
Network Computing: "Host-level security is but one building block when constructing an in-depth security strategy. As such, it presents another level of...
Can broadband revive tech industry?
Author: JT Smith
ZDNet reports that "echnology and telecoms firms could kickstart their languishing business if they can get the high-speed Internet into homes and...
Mandrake: ‘kernel22’ DoS vulnerability
Author: JT Smith
LinuxSecurity.com: A vulnerablity in the 2.2.19 and 2.4.11 Linux kernels could be used by local users to gain root privilages and could...
Issue #33 of Georg’s Brave GNU World
Author: JT Smith
"Issue #33 of the column is now online and it can - as usual - be found
on the GNU Webpage and its...
Pope sends first e-mail
Author: JT Smith
CBC: "In an unprecedented event
...
Scientists build tiny computer of DNA
Author: JT Smith
CBC: "Israeli scientists have followed Mother
...
Return of the ninja Trojan
Author: JT Smith
Anonymous Reader writes: "The ninja Trojan infecting Linux boxes earlier this month seems to have returned. This time it's picking on Microsoft:...
SuSE: ‘susehelp’ remote command execution vulnerability
Author: JT Smith
SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...
SuSE: ‘susehelp’ remote command execution vulnerability
Author: JT Smith
SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...