Home Search

red hat - search results

If you're not happy with the results, please do another search

Crackers and honey: An irresistible combination for network security

Author: Mayank Sharma Denial of service (DoS) attacks aim to take down Web servers and other Internet resources, often by swarming them with repeated requests,...

Linux kernel, Netscape affected by major zlib security vulnerability

Author: JT Smith - By Grant Gross - A buffer overflow vulnerability affecting the PPP code in the Linux kernel, Netscape and up to...

Game over for Loki

Author: JT Smith "This is the week that Loki Software, Inc., the once-promising Linux games company that came to resemble Enron writ small, disappears beneath ...

TuxBox game tutorial released

Author: JT Smith vmlinuz writes, "After counless hours of work, here is the TuxBox Game Tutorial. Very early version of course, but it should teach...

Storm Linux

Author: JT Smith Storm Linux is a Debian GNU/Linux based distribution designed for the desktop and network markets. Enhancements include the Storm installer,...

Caldera OpenLinux

Author: Benjamin D. Thomas Caldera Systems, Inc. is the leader in providing Linux®-based business solutions through its award-winning OpenLinux line of products and...

Yellow Dog Linux

Author: Benjamin D. Thomas Yellow Dog Linux takes advantage of the most current, stable, and secure Linux kernel and libraries, and best of...

How we designed a long-lasting web-hosting service on Linux: 3 lessons learned

The decisions we made in designing our Linux web-hosting service (and the tips we gathered along the way) kept it up and running for...