Home Search
red hat - search results
If you're not happy with the results, please do another search
The future supercomputer: Colossus or cluster?
eCommerce Times: "hen the newest, much-anticipated list of Top 500 Supercomputer Sites... was released last week, the computer equivalent of a Honda had entered...
EnGarde Secure Linux: OpenSSH and mod_ssl
EnGarde Secure Linux: "ISS and the OpenBSD team found several vulnerabilities in the OpenSSH secure shell daemon as outlined by the OpenSSH advisory ...
Why MandrakeSoft will not join UnitedLinux
MandrakeSoft has issued a statement explaining why it will not join UnitedLinux. In their statement they argue against what they see as a false...
Conectiva: Apache off-by-one mod_ssl buffer overflow
"An off-by-one buffer overflow vulnerability exists in the code which handles entries in .htaccess files in mod_ssl <= 2.8.9. It was discovered by Frank...
Zimmermann to Network Associates: Sell PGP back to me, or open-source it
Author: JT Smith
- by Bruce Tober -
Philip R. Zimmermann, author of encryption program Pretty Good Privacy, is suggesting current owner Network Associates open-source PGP's...
Microsoft casts .Net for Java workers
News.com: "Microsoft has released a new programming tool aimed at attracting Java developers to its .Net software strategy... Microsoft executives predict that 12 percent...
The Open Source way to fame and fortune
- By Robin "Roblimo" Miller -
Imagine this: you are a competitive but not outstanding player of the online game Team Fortress. You decide you...
ICANN squeezes out regular folk
From Wired:
"The group that oversees the Internet's name system voted on Friday to exclude ordinary Web surfers from its board, a move which critics
...
Xbox is great for…. software pirates
We aren't making this up. We're just reading a story at news.independent.co.uk that says, among other interesting things about the XBox, "Hackers have discovered...
Conectiva Linux Advisory: OpenSSH
Conectiva: "ISS published an advisory concerning a remote vulnerability in OpenSSH that could be used by remote attackers to obtain root privileges on the...