Home Search

lin - search results

If you're not happy with the results, please do another search

Assessing the security risk: The OCTAVE method

Author: JT Smith highlander of CIOL writes: "Information systems are vital for any organization and the first step to address that is to understand the...

Jon `maddog’ Hall & Robin `roblimo’ Miller to speak at CTS

Author: JT Smith "The Suncoast Linux Users group is going to be at the Computer and Technologies Showcase on May 30th and 31st...

18th century warfare to fight Internet crackers

Author: JT Smith "The Register: "A technology working group of the SIIA's ebusiness division has come up with an ...

Encrypting algorithms

Author: JT Smith highlander writes: "The safety of an encryption mechanism depends largely upon the level of difficulty in 'finding' the decryption key. Here CIOL...

Open Source development and handhelds: A match made in heaven?

Author: JT Smith - By Grant Gross - You don't have to read a lot of technology news before you run into a story about...

Microsoft engineers distribute copylefted IPv6 web server

Author: JT Smith Linux Today reports that there is a GNU licensed IPv6 web server downloadable at Microsoft. Category: Open Source

How committed is Apple to Open Source?

Author: JT Smith Anonymous Reader writes "http://penguinppc.org/articles/aploss penguinppc.org weighs in on Apple's record with Linux and OSS." Category: Open Source

Oracle bids Joe Lockhart adieu

Author: JT Smith TheStandard: "Former White House press secretary Joe ...

VeriSign pulls critic-heavy discussion list

Author: JT Smith CNET News.com: "The company that manages databases for the Internet's most popular names ...

Logitech wireless mice & keyboards can be sniffed

Author: JT Smith From Slashdot: "The old adage 'The only safe computer is locked in a room and ...