Home Search

lin - search results

If you're not happy with the results, please do another search

GNOME Summary

Author: JT Smith The GNOME Summary covering July 29 through August 4 is now available. Read all about GNOME Basic and Mono, a new home...

Is copy protection dead on arrival?

Author: JT Smith CNET News.com: "For several weeks, news that record companies have quietly been selling copy-protected ...

An operating system alternative

Author: JT Smith "Paul Foster is a believer. Microsoft may have billions of ...

F*** you, Code Red

Author: JT Smith - by Tina Gasperson - My firewall logs are bigger ... I mean, longer ... I mean, more verbose than yours. Comparisons are...

Companies hacked on average six or more times each year

Author: JT Smith Lexis-nexis.com: "A survey of American companies reveals that not only are companies' networks being attacked six or more times per year, but...

Web sites prey on rivals’ stores

Author: JT Smith CNET: "One e-tailer that's been bitten is 1800Flowers.com. When certain Web surfers visit the site to ...

Who will buy Be, Inc.?

Author: JT Smith Kelly McNeill writes: "The Internet rumor mill has been buzzing once again, as recent reports have suggested that struggling Be, Inc. has...

Feds say spy tool is a secret

Author: JT Smith Wired: "Revealing information about a classified surveillance technique would threaten national security and put government agents at risk, say U.S. government attorneys."

Top ten places your email can be intercepted

Author: JT Smith WildID.com: "We will attempt to outline the varying paths that an email message may travel, and who some of those different...

‘Code Red II’ worm 4,000 times faster than original

Author: JT Smith Kelly McNeill writes: "After breathing a sigh of relief over the limited impact of last week's return of the "Code Red" computer...