Home Search

lin - search results

If you're not happy with the results, please do another search

IE hole reveals users’ cookie data

Author: JT Smith PC World reports: "A newly reported vulnerability in Microsoft's Internet Explorer allows hackers to steal or corrupt cookie information on a user's...

Firewalls–as safe as you think?

Author: JT Smith ZDNet reports that "Consumers protecting their PCs with personal firewalls should not feel too comfortable in their defense methods, according to a...

LynuxWorks unveils BlueCat 4.0

Author: JT Smith Daniel McKean writes, LynuxWorksInc., a provider of open source and real-time embedded solutions, today unveiled the latest version of its popular BlueCat...

Sysctl: What is it and what can I do with it?

Author: JT Smith From BSDToday: "Sysctl() is a function that is included in OpenBSD, FreeBSD, NetBSD and Linux. The ...

Government agencies fail security test

Author: JT Smith ZDNet reports a subcommittee of the U.S. House Committee on Government Reform heard Friday that government agencies have some chronic problems...

Hackers: We can crack IBM security

Author: JT Smith Reuters reports that two graduate students have found a way to hack into ...

Open Source stock report: Borland betters Kylix while HP squabbles

Author: JT Smith - By Dan Berkes - The markets closed on an up note this Friday, responding favorably to the U.S. Federal Reserve's 10th rate...

Bluetooth will be a success after all

Author: JT Smith Bluetooth will be a huge success, selling over 100 million handhelds in 2003 when 3G networks start working on larger scales. That's...

IBM building a ‘self-aware’ supercomputer

Author: JT Smith "Supercomputing leader IBM on Friday announced that it has begun assembling a colossal supercomputer called Blue Sky for The National Center for...

IBM AS/400 HTTP Server ‘/’ attack

Author: JT Smith "IBM's HTTP Server on the AS/400 platform is vulnerable to an attack that will show the source code of the page --...