Home Search
lin - search results
If you're not happy with the results, please do another search
RedHat: ‘exim’ format string vulnerability
Author: JT Smith
LinuxSecurity: "A locally exploitable format string bug has been fixed in the code that
...
Rotating log files
Author: JT Smith
O'Reilly's Onlamp discusses the need and methodology behind rotating log files specifically under BSD, but the information also applies to most unices.
Category:...
What crackers can teach you about security
Author: JT Smith
ZDNet discusses how crackers can help people learn about the security of their systems, and some tips for what you should do...
MP3.com suit declared a mistrial
Author: JT Smith
News.com: "TVT Records on Tuesday said a court has declared a mistrial
...
Web vigilantes counter-attack ‘hackers’
Author: JT Smith
PCWorld: "As security breaches explode and law enforcement struggles to keep up, some organizations are taking the law into their own
...
GNU Compiler Collection version 3.0 is released
Author: JT Smith
"The Free Software
Foundation announced today the 3.0 release of the GNU Compiler Collection
(GCC). GCC is a Free (as in freedom) Software...
Microsoft Web security hole found
Author: JT Smith
MSNBC: "Microsoft Corp. has issued an urgent
high-risk...
Simputer’s Ajit Anvekar: Keeping up the Open Source ‘josh’
Author: JT Smith
- By Julie Bresnick - Open Source people -
Ajit R. Anvekar didn't grow up with a computer, in fact, he bought
his...
Red Hat + Apache reaches 4,602 Web requests per second
Author: JT Smith
ZDNet reports on benchmark tests which indicate that a Red Hat system running a 2.4.5 kernel and Apache can handle up to...
The New XFree86
Author: JT Smith
Linux Weekly News reviews the book "The New XFree86" with moderate optimism. Noting the book tries to cover what O'Reilly took 10...