Home Search

lin - search results

If you're not happy with the results, please do another search

Build your own PC and save

Author: JT Smith MSNBC: "Personal computers are traditionally a popular ...

Locked down out of the box

Author: JT Smith Network Computing: "Host-level security is but one building block when constructing an in-depth security strategy. As such, it presents another level of...

Can broadband revive tech industry?

Author: JT Smith ZDNet reports that "echnology and telecoms firms could kickstart their languishing business if they can get the high-speed Internet into homes and...

Mandrake: ‘kernel22’ DoS vulnerability

Author: JT Smith LinuxSecurity.com: A vulnerablity in the 2.2.19 and 2.4.11 Linux kernels could be used by local users to gain root privilages and could...

Issue #33 of Georg’s Brave GNU World

Author: JT Smith "Issue #33 of the column is now online and it can - as usual - be found on the GNU Webpage and its...

Pope sends first e-mail

Author: JT Smith CBC: "In an unprecedented event ...

Scientists build tiny computer of DNA

Author: JT Smith CBC: "Israeli scientists have followed Mother ...

Return of the ninja Trojan

Author: JT Smith Anonymous Reader writes: "The ninja Trojan infecting Linux boxes earlier this month seems to have returned. This time it's picking on Microsoft:...

SuSE: ‘susehelp’ remote command execution vulnerability

Author: JT Smith SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...

SuSE: ‘susehelp’ remote command execution vulnerability

Author: JT Smith SuSE A.G.: The susehelp package contains several CGI-scripts to provide a flexible help-system to the user. Some of these scripts open files...