Home Search

lin - search results

If you're not happy with the results, please do another search

The mind of the ‘hacker’

Author: JT Smith Retail Tech: "Who are these people known as hackers? Who hacks, and why? Should you care, as long as you make sure...

A Chinese call to ‘hack’ U.S.

Author: JT Smith Wired: "Tensions between the United States and China are compelling some Chinese activists to launch a variety of Internet attacks. Linux e-mail...

NSA takes the Open Source route

Author: JT Smith Wired: "An unlikely partnership between the ultra-secretive National Security Agency and the Linux open-source community seeks to make Linux the most secure...

Indrema fragged

Author: JT Smith The Register: "So farewell, then, Indrema and its Linux-based games console-cum-set-top ...

Cracks happen; protect thyself

Author: JT Smith Wired: "Security experts concede that 'hackers' and crackers can infiltrate most systems, particularly those in less-sensitive businesses. In other words, it's out...

IBM should ‘netscape’ Microsoft by buying Corel

Author: JT Smith - By Tony Stanco- A free software strategic analysis - There is a certain irony in hoisting protagonists by their own petard that appeals...

Argus hardens e-business security

Author: JT Smith TechWeb has a story about one company's efforts to market hardened servers. "Argus Systems stepped up efforts this week to supply ...

theKompany.com releases Rekall Beta 1

Author: JT Smith From LinuxPR: theKompany.com is pleased to announce the highly anticipated Technology Preview Release (TPR) of Rekall, a persona,...

MontaVista targets mobile and connected applications for Hitachi SuperH processors

Author: JT Smith From LinuxPR: MontaVista Software Inc., the company powering the embedded revolution, today announced the availability of the Hard ...

Security update to mc

Author: JT Smith Posted at LWN.net: "The Midnight Commander, mc(1), is a ncurses-based file manager. A local attacker could trick mc(1) into...