Home Search
red hat - search results
If you're not happy with the results, please do another search
Book review: Samba-3 by Example
Author: Joe 'Zonker' Brockmeier
Too many technical books provide superficial coverage of their subject matter. Samba-3 by Example by John H. Terpstra, a long-time member...
The Present and Future with Fedora Core 4
Each new release of Fedora Core brings with it new possibilities. Red Hat Enterprise and Fedora Core 4: The Complete Reference by Richard Petersen...
Review: Matrox Millennium G550 for PCI Express
Author: Jem Matzan
Matrox Millennium graphics cards have for years proven reliable, with great drivers, good 2D rendering capabilities, and decent resolutions are supported. They...
Asianux 2.0
Author: Irfan Habib
Last month, Chinese Red Flag Software, Japanese Miracle Linux, and South Korean HaanSoft jointly released the GNU/Linux-based operating system Asianux 2.0. The...
Review: StarOffice 8
Author: Jem Matzan and Joe 'Zonker' Brockmeier
StarOffice is a suite of interoperable "office" programs that use the same software shell as their basis. The...
Linux Advisory Watch – September 23, 2005
Author: Benjamin D. Thomas
This week, advisories were released for turqstat, centericq, lm-sensors, kdebase,
python, XFree86, Mailutils, Shorewall, mozilla, mod_ssl, clam, mod_ssl, Zebedee,
...
New commercial toolsuite targets real-time, SMP embedded Linux
A systems integrator specializing in real-time and mission-critical systems has entered the Linux development tools market. Concurrent is now shipping NightStar, a suite of...
The Present and Future with Fedora Core 4
Each new release of Fedora Core brings with it new possibilities. Red Hat Enterprise and Fedora Core 4: The Complete Reference by Richard Petersen...
Oracle(r) Database 10g Release 2 on Linux Sets World Record TPC-H Benchmark Result in...
Today Oracle announced a new world record TPC-H 300 gigabyte (GB) data warehousing benchmark for Oracle(r) Database 10g Release 2 and Oracle Real...
Protecting Linux against automated attackers
Author: Ryan Twomey
As many systems administrators will tell you, attacks from automated login scripts specifically targeting common account names with weak passwords have become...