Home Search

open - search results

If you're not happy with the results, please do another search

Linux-based PDAs begin to emerge

Author: JT Smith NetworkWorldFusion reports that "Linux is making inroads into the personal digital assistant market with a number of handheld companies announcing support for...

Debian Security: DSA-119 ssh

Author: JT Smith Debian: "Joost Pol reports that OpenSSH versions 2.0 through 3.0.2 have an off-by-one bug in the channel allocation code. This vulnerability can...

Crackers and honey: An irresistible combination for network security

Author: Mayank Sharma Denial of service (DoS) attacks aim to take down Web servers and other Internet resources, often by swarming them with repeated requests,...

The Evolution continues

Author: JT Smith Joe Barr writes us about this story: http://www.linuxworld.com/site-stories/2002/0311.e volution.html. "A couple of weeks ago I wrote about moving from Sylpheed (a wonderful...

Linux kernel, Netscape affected by major zlib security vulnerability

Author: JT Smith - By Grant Gross - A buffer overflow vulnerability affecting the PPP code in the Linux kernel, Netscape and up to...

TuxBox game tutorial released

Author: JT Smith vmlinuz writes, "After counless hours of work, here is the TuxBox Game Tutorial. Very early version of course, but it should teach...

librivox – distributed public domain audio lit

Hugh McGuire writes "I thought you might be interested in the LibriVox project, a distributed open source audio literature project, started in August of...

MkLinux

Author: Benjamin D. Thomas MkLinux takes advantage of the Mach Kernel abstraction to run on HPPA, Intel, and PowerPC. MkLinux will run on...

SuSE Linux

Author: Benjamin D. Thomas SuSE Linux includes over 1500 applications. With the new graphical installation tool, users can be up and running ...

Storm Linux

Author: JT Smith Storm Linux is a Debian GNU/Linux based distribution designed for the desktop and network markets. Enhancements include the Storm installer,...