Home Search

lin - search results

If you're not happy with the results, please do another search

Pepsi site smacked

Author: JT Smith PepsiCo's UK Web site has...

Microsoft cracker fired

Author: JT Smith The Register reports: The guy who made Microsoft look foolish in November by breaking into its servers through a known security hole...

GTK frame buffer port

Author: JT Smith There are some great news for all GTK+ lovers! You can run your gtk based applications without X! Just a few moments...

Run levels explained

Author: JT Smith Linux World explains what, exactly, a run level is. From shutting down (0) to rebooting (6), run levels often confuse users new...

Loki announces development of two new games

Author: JT Smith Linux PR has an announcement by Loki about two new games the company will be porting to Linux. Rune and Heavy Metal...

Using Certificate Revocation Lists with Apache

Author: JT Smith From ApacheWeek: "Certificate Revocation Lists (CRL) increase the security of Client Authentication Realms by enabling server ...

Review: Logitech Wheel Mouse Optical

Author: JT Smith By Jeff Field When picking your mouse and keyboard, personal preference and comfort have to take precedence over any whiz-bang features. Most serious...

The 10 naws of complete security

Author: JT Smith Wicrosoft has released its top 10 concerns for security issues. Category: Linux

Intel Pentium 4: consumer intelligence test?

Author: JT Smith ZDNet reports on the release of a slowed down 1.3GHz Pentium 4 processor which is outperformed by the older 1GHz Pentium 3...

LaTeX: A diamond in the rough

Author: JT Smith From ZDNet: "So why isn't LaTeX right up there with all the other ...