Home Search
lin - search results
If you're not happy with the results, please do another search
WireX releases FormatGuard 1.0
Author: JT Smith
LinuxSecurity: "WireX is pleased to announce the broad release of FormatGuard 1.0, the latest member of the Immunix security tool suite.
...
A worm writer’s worst friend
Author: JT Smith
Wired: "Sarah Gordon, part of Symantec's AntiVirus Research Center team, specializes in profiling the people who write destructive e-mail worms. And no,...
An Argentinian, Open Source software development company
Author: JT Smith
An anonymous reader writes: "The Argentinian software development company named RVA Information Technology (in short RVAit) started her transformation by the GNU...
Talking freely with Freenet coder Brandon Wiley
Author: JT Smith
- By Julie Bresnick - Open Source people -Brandon
Wiley, avid programmer and original coder of peer-to-peer service Freenet may talk like a...
IBM delivers Itanium-based systems for supercomputer
Author: JT Smith
From LinuxPR: IBM today announced new Intel
ItaniumTM-based eServer and IntelliStation workstations which will form a
new Linux...
SuSE 7.2 available June 15
Author: JT Smith
From LinuxPR: Today, SuSE Linux, the
international technology leader and solutions provider in Open Source,
announced the availability...
Enlighten WebDSM adds browser-based network monitoring
Author: JT Smith
From PR Newswire: Enlighten Software Solutions,
Inc. (Nasdaq: SFTW), a leading provider of system management software for
Linux, Unix, Windows and FreeBSD, today announced...
SourceForge shell server back up after security breach
Author: JT Smith
- By Grant Gross -
A shell server for popular Open Source project hosting site SourceForge is back on line after a...
Live and let license
Author: JT Smith
Joe Barr writes "If you're ever confused by, or mixed up the terms, "open source" and "free sofware," this is for you....
Proxy exposes Excite@Home data
Author: JT Smith
SecurityFocus: "A single misconfigured server exposed broadband provider Excite@Home's internal corporate network
to hackers for at least three months, making its customer list...