Home Search

red hat - search results

If you're not happy with the results, please do another search

Free software funding proposal

Author: JT Smith proclus writes: "I submitted this suggestion to Pat McGovern of SourceForge. He is a really busy guy, so don't hold your breath, but...

LynuxWorks responds to Microsoft attack on embedded Linux

Author: JT Smith Anonymous Reader writes "Embedded Linux vendor LynuxWorks joined the growing chorus of responses to Microsoft's recent efforts to portray Embedded Linux as...

California supreme court will hear DVD-copying appeal

Author: JT Smith ComputerUser.com: "On August 7, the Court of Appeal in the Sixth Appellate District of California said a lower-court judge was correct in...

EnGarde: ‘glibc’ globbing buffer overflow

Author: JT Smith EnGarde: "While researching the recent globbing bugs in wu-ftpd, Flavio Veloso flaviovs@magnux.com> discovered (with the assistance of Jakub Jelinek jakub@redhat.com>)...

Netegrity embeds Covalent’s Apache-based Web technology into SiteMinder Secure Proxy Server

Author: JT Smith Covalent, the leader in enterprise solutions for the Apache Web server, and Netegrity, Inc. (Nasdaq: NETE), the leading provider of...

Microsoft’s cookie monster

Author: JT Smith BusinessWeek: "Whatever you think of Microsoft, there's no escaping the ...

Frog freshens up Microsoft’s overbearing image

Author: JT Smith NewsFactor Network writes: "Since Microsoft released Windows XP last October, one defining factor that has helped soften the company's overbearing image is...

Virtual keyboards to fight FBI Magic Lantern

Author: JT Smith Marcin Kurzawa writes: "Half a day after FBI confirmed the existence of the Magic Lantern project (on Dec 12) CryptoHeaven released v1.0...

LinuxWorld 2002 could see some turbulence, but officials are positive

Author: JT Smith - by Tina Gasperson - LinuxWorld Conference & Expo is about to enter its fourth year of existence. After three years of soaring...

LinuxSecurity.com reviews the Honeynet Project’s Know Your Enemy book

Author: JT Smith LinuxSecurity Contributors writes "The Honeynet Project's first book details how a honeynet works, how to analzye the data once ...