Home Search
lin - search results
If you're not happy with the results, please do another search
GNOME Summary
Author: JT Smith
The GNOME Summary covering July 29 through August 4 is now available. Read all about GNOME Basic and Mono, a new home...
Is copy protection dead on arrival?
Author: JT Smith
CNET News.com:
"For several weeks, news that record companies have quietly been selling
copy-protected ...
An operating system alternative
Author: JT Smith
"Paul Foster is a believer. Microsoft may have billions of
...
F*** you, Code Red
Author: JT Smith
- by Tina Gasperson -
My firewall logs are bigger ... I mean, longer ... I mean, more verbose than yours. Comparisons are...
Companies hacked on average six or more times each year
Author: JT Smith
Lexis-nexis.com: "A survey of American companies reveals that not only are companies' networks being attacked six or more times per year, but...
Web sites prey on rivals’ stores
Author: JT Smith
CNET: "One e-tailer that's been bitten is 1800Flowers.com. When certain Web surfers visit the site to
...
Who will buy Be, Inc.?
Author: JT Smith
Kelly McNeill writes: "The Internet rumor mill has been buzzing once again, as recent reports have suggested that struggling Be, Inc. has...
Feds say spy tool is a secret
Author: JT Smith
Wired: "Revealing information about a classified surveillance technique would threaten national security and put government agents at risk, say U.S. government attorneys."
Top ten places your email can be intercepted
Author: JT Smith
WildID.com: "We will attempt to outline the varying paths that an email message may travel, and who some of those different...
‘Code Red II’ worm 4,000 times faster than original
Author: JT Smith
Kelly McNeill writes: "After breathing a sigh of relief over the limited impact of last week's return of the "Code Red" computer...