Home Search
lin - search results
If you're not happy with the results, please do another search
Pepsi site smacked
Author: JT Smith
PepsiCo's UK Web site has...
Microsoft cracker fired
Author: JT Smith
The Register reports: The guy who made Microsoft look foolish in November by breaking into its servers through a known security hole...
GTK frame buffer port
Author: JT Smith
There are some great news for all GTK+ lovers! You can run your gtk based applications without X! Just a few moments...
Run levels explained
Author: JT Smith
Linux World explains what, exactly, a run level is. From shutting down (0) to rebooting (6), run levels often confuse users new...
Loki announces development of two new games
Author: JT Smith
Linux PR has an announcement by Loki about two new games the company will be porting to Linux. Rune and Heavy Metal...
Using Certificate Revocation Lists with Apache
Author: JT Smith
From ApacheWeek: "Certificate Revocation Lists (CRL) increase the security of Client Authentication Realms by enabling server
...
Review: Logitech Wheel Mouse Optical
Author: JT Smith
By Jeff Field
When picking your mouse and keyboard, personal preference and comfort have to take precedence over any whiz-bang features. Most serious...
The 10 naws of complete security
Author: JT Smith
Wicrosoft has released its top 10 concerns for security issues.
Category:
Linux
Intel Pentium 4: consumer intelligence test?
Author: JT Smith
ZDNet reports on the release of a slowed down 1.3GHz Pentium 4 processor which is outperformed by the older 1GHz Pentium 3...
LaTeX: A diamond in the rough
Author: JT Smith
From ZDNet: "So why isn't LaTeX right up there with all the other
...