Home Search
lin - search results
If you're not happy with the results, please do another search
Dave Dittrich responds to Steve Gibson’s Windows XP security claims
Author: JT Smith
Dave Dittrich, known in security circles as an expert on DDoS methods and for his Honeynet Prject, has written a response to...
Hack breaks security site’s back
Author: JT Smith
Wired News: "A security news website closed down Wednesday after its owner decided it wasn't worth fighting a malicious hacker who defaced...
Corrupt RPM query vulnerability
Author: JT Smith
Posted at Help Net Security: "It is possible to create an RPM (Redhat Package Management) file
...
Oracle trace collection security vulnerability
Author: JT Smith
"A potential security vulnerability has been discovered in the
...
Commentary: The threat of Microsoft’s .NET
Author: JT Smith
Commentary from Sun's Whit Diffie and Susan Landau: "Remember, Willie Sutton used to rob banks because "that's where the money is."
Suppose...
New Yahoo software intended as threat to Microsoft
Author: JT Smith
Kelly McNeill writes "Yahoo Inc. fired a volley at rival Microsoft on Tuesday by unveiling downloadable software that allows users to replace...
Internet Exchange Messaging Server Open API provides dynamic tools for developers
Author: JT Smith
Ana Monsanto writes, With the release of the Internet Exchange Messaging Server (IEMS) 5.1, International Messaging Associates (IMA) announces new tools to...
Arguments against the SSSCA
Author: JT Smith
Speare writes, "As reported at NewsForge earlier, the US Senate Commerce Committee was scheduled to hold a hearing about the "Security...
Put many operating systems under one roof
Author: JT Smith
Krissi Danielsson writes, " At searchwindowsmanageability.techtarget.com:
Do you want to run Linux, Unix, and Windows on one server or Windows applications on Linux?...
Wow! ‘ext3’ really works!
Author: JT Smith
Dave writes, "I've been toying with the idea of implementing a journalling filesystem on the Redhatbox.org server for quite a while now....