Home Search
lin - search results
If you're not happy with the results, please do another search
IE hole reveals users’ cookie data
Author: JT Smith
PC World reports: "A newly reported vulnerability in Microsoft's Internet Explorer allows hackers to steal or corrupt cookie information on a user's...
Firewalls–as safe as you think?
Author: JT Smith
ZDNet reports that "Consumers protecting their PCs with personal firewalls should not feel too comfortable in their defense methods, according to a...
LynuxWorks unveils BlueCat 4.0
Author: JT Smith
Daniel McKean writes, LynuxWorksInc., a provider of open source and real-time embedded solutions, today unveiled the latest version of its popular BlueCat...
Sysctl: What is it and what can I do with it?
Author: JT Smith
From BSDToday: "Sysctl() is a function that is included in OpenBSD, FreeBSD, NetBSD and Linux. The
...
Government agencies fail security test
Author: JT Smith
ZDNet reports a subcommittee of the U.S. House Committee on Government Reform heard Friday that government agencies have some chronic problems...
Hackers: We can crack IBM security
Author: JT Smith
Reuters reports that two graduate students have found a way to hack into
...
Open Source stock report: Borland betters Kylix while HP squabbles
Author: JT Smith
- By Dan Berkes -
The markets closed on an up note this Friday, responding favorably to the U.S. Federal Reserve's 10th rate...
Bluetooth will be a success after all
Author: JT Smith
Bluetooth will be a huge success, selling over 100 million handhelds in 2003 when 3G networks start working on larger scales. That's...
IBM building a ‘self-aware’ supercomputer
Author: JT Smith
"Supercomputing leader IBM on Friday announced that it has begun assembling a colossal supercomputer called Blue Sky for The National Center for...
IBM AS/400 HTTP Server ‘/’ attack
Author: JT Smith
"IBM's HTTP Server on the AS/400 platform is vulnerable to an attack that will show the source code of the page --...