Home Search

lin - search results

If you're not happy with the results, please do another search

RedHat: ‘exim’ format string vulnerability

Author: JT Smith LinuxSecurity: "A locally exploitable format string bug has been fixed in the code that ...

Rotating log files

Author: JT Smith O'Reilly's Onlamp discusses the need and methodology behind rotating log files specifically under BSD, but the information also applies to most unices. Category:...

What crackers can teach you about security

Author: JT Smith ZDNet discusses how crackers can help people learn about the security of their systems, and some tips for what you should do...

MP3.com suit declared a mistrial

Author: JT Smith News.com: "TVT Records on Tuesday said a court has declared a mistrial ...

Web vigilantes counter-attack ‘hackers’

Author: JT Smith PCWorld: "As security breaches explode and law enforcement struggles to keep up, some organizations are taking the law into their own ...

GNU Compiler Collection version 3.0 is released

Author: JT Smith "The Free Software Foundation announced today the 3.0 release of the GNU Compiler Collection (GCC). GCC is a Free (as in freedom) Software...

Microsoft Web security hole found

Author: JT Smith MSNBC: "Microsoft Corp. has issued an urgent high-risk...

Simputer’s Ajit Anvekar: Keeping up the Open Source ‘josh’

Author: JT Smith - By Julie Bresnick - Open Source people - Ajit R. Anvekar didn't grow up with a computer, in fact, he bought his...

Red Hat + Apache reaches 4,602 Web requests per second

Author: JT Smith ZDNet reports on benchmark tests which indicate that a Red Hat system running a 2.4.5 kernel and Apache can handle up to...

The New XFree86

Author: JT Smith Linux Weekly News reviews the book "The New XFree86" with moderate optimism. Noting the book tries to cover what O'Reilly took 10...