Home Search
lin - search results
If you're not happy with the results, please do another search
The mind of the ‘hacker’
Author: JT Smith
Retail Tech: "Who are these people known as hackers? Who hacks, and why? Should you care, as long as you make sure...
A Chinese call to ‘hack’ U.S.
Author: JT Smith
Wired: "Tensions between the United States and China are compelling some Chinese activists to launch a variety of Internet attacks. Linux e-mail...
NSA takes the Open Source route
Author: JT Smith
Wired: "An unlikely partnership between the ultra-secretive National Security Agency and the Linux open-source community seeks to make Linux the most secure...
Indrema fragged
Author: JT Smith
The Register: "So farewell, then, Indrema and its Linux-based games console-cum-set-top
...
Cracks happen; protect thyself
Author: JT Smith
Wired: "Security experts concede that 'hackers' and crackers can infiltrate most systems, particularly those in less-sensitive businesses. In other words, it's out...
IBM should ‘netscape’ Microsoft by buying Corel
Author: JT Smith
- By Tony Stanco-
A free software strategic analysis -
There is a certain irony in hoisting protagonists by their own petard
that
appeals...
Argus hardens e-business security
Author: JT Smith
TechWeb has a story about one company's efforts to market hardened servers. "Argus Systems stepped up efforts this week to supply
...
theKompany.com releases Rekall Beta 1
Author: JT Smith
From LinuxPR:
theKompany.com is pleased to announce the highly anticipated Technology
Preview Release (TPR) of Rekall, a persona,...
MontaVista targets mobile and connected applications for Hitachi SuperH processors
Author: JT Smith
From LinuxPR: MontaVista Software Inc., the company
powering the embedded revolution, today announced the availability of the Hard
...
Security update to mc
Author: JT Smith
Posted at LWN.net: "The Midnight Commander, mc(1), is a ncurses-based file manager.
A local attacker could trick mc(1) into...