Home Search

lin - search results

If you're not happy with the results, please do another search

The Internet is an open book – protect yourself with secure protocols

Author: JT Smith Kelly McNeill writes "In this age of viruses, hacking, terrorism and paranoia, people are becoming more and more interested in finding ways...

Logging syslog to a database

Author: JT Smith Daemon News reports: "When there's a problem on your system, or in your network, the first thing you check are system logs....

Windows XP rings up lackluster sales

Author: JT Smith ZDNet reports that despite "heavy marketing and lucrative rebates being offered by retailers, early resutls indicate that sales of Windows XP are...

Prodigy to sell Ellison’s Net appliance

Author: JT Smith "Under the terms of the deal, expected to be announced in coming days, Prodigy will sell the Linux-based Web device, known as...

Red Hat comprehensive printing update

Author: JT Smith A collection of security fixes, bug fixes, and functionality updates, including the Omni print drivers from IBM. --------------------------------------------------------------------- ...

Rackspace & Red Hat announce turnkey e-commerce solution

Author: JT Smith Rackspace Managed Hosting, a leading provider of managed hosting services, and Red Hat (Nasdaq: RHAT), the leader in developing, deploying and managing open source...

Protecting your network with Snort

Author: JT Smith From LinuxWorld: "Snort offers many options. However, setting it up is easier than you may think. Here's how to start protecting your...

Sitellite Content Management System 2.1.1 is out

Author: JT Smith Posted at LinuxPR: "Sitellite Content Management System 2.1.1 is a world-class web collaboration tool and application framework, which drastically simplifies both the...

Kernel Cousin KDE #23

Author: JT Smith In the 23rd edition of Kernel Cousin KDE, Aaron J. Seigo writes: "It has been another fast-paced week for KDE. CVS commits...

EnGarde advisory for webalizer scripting vulnerability

Author: JT Smith There is a cross-site scripting vulnerability in webalizer which can allow an attacker to exploit a victim by embedding malicious HTML...