Home Search
lin - search results
If you're not happy with the results, please do another search
Assessing the security risk: The OCTAVE method
Author: JT Smith
highlander of CIOL writes: "Information systems are vital for any organization and the first step to address that is to understand the...
Jon `maddog’ Hall & Robin `roblimo’ Miller to speak at CTS
Author: JT Smith
"The Suncoast Linux Users group is going to be at the Computer and
Technologies Showcase on May 30th and 31st...
18th century warfare to fight Internet crackers
Author: JT Smith
"The Register: "A technology working group of the SIIA's ebusiness division has come up with an
...
Encrypting algorithms
Author: JT Smith
highlander writes: "The safety of an encryption mechanism depends largely upon the level of difficulty in 'finding' the decryption key. Here CIOL...
Open Source development and handhelds: A match made in heaven?
Author: JT Smith
- By Grant Gross -
You don't have to read a lot of technology news before you run into a story about...
Microsoft engineers distribute copylefted IPv6 web server
Author: JT Smith
Linux Today reports that there is a GNU licensed IPv6 web server downloadable at Microsoft.
Category:
Open Source
How committed is Apple to Open Source?
Author: JT Smith
Anonymous Reader writes "http://penguinppc.org/articles/aploss
penguinppc.org weighs in on Apple's record with Linux and OSS."
Category:
Open Source
Oracle bids Joe Lockhart adieu
Author: JT Smith
TheStandard: "Former White House press secretary Joe
...
VeriSign pulls critic-heavy discussion list
Author: JT Smith
CNET News.com: "The company that manages databases for the Internet's most popular names
...
Logitech wireless mice & keyboards can be sniffed
Author: JT Smith
From Slashdot: "The old adage 'The only safe computer is locked in a room and
...