Home Search

red hat - search results

If you're not happy with the results, please do another search

Book review: Samba-3 by Example

Author: Joe 'Zonker' Brockmeier Too many technical books provide superficial coverage of their subject matter. Samba-3 by Example by John H. Terpstra, a long-time member...

The Present and Future with Fedora Core 4

Each new release of Fedora Core brings with it new possibilities. Red Hat Enterprise and Fedora Core 4: The Complete Reference by Richard Petersen...

Review: Matrox Millennium G550 for PCI Express

Author: Jem Matzan Matrox Millennium graphics cards have for years proven reliable, with great drivers, good 2D rendering capabilities, and decent resolutions are supported. They...

Asianux 2.0

Author: Irfan Habib Last month, Chinese Red Flag Software, Japanese Miracle Linux, and South Korean HaanSoft jointly released the GNU/Linux-based operating system Asianux 2.0. The...

Review: StarOffice 8

Author: Jem Matzan and Joe 'Zonker' Brockmeier StarOffice is a suite of interoperable "office" programs that use the same software shell as their basis. The...

Linux Advisory Watch – September 23, 2005

Author: Benjamin D. Thomas This week, advisories were released for turqstat, centericq, lm-sensors, kdebase, python, XFree86, Mailutils, Shorewall, mozilla, mod_ssl, clam, mod_ssl, Zebedee, ...

New commercial toolsuite targets real-time, SMP embedded Linux

A systems integrator specializing in real-time and mission-critical systems has entered the Linux development tools market. Concurrent is now shipping NightStar, a suite of...

The Present and Future with Fedora Core 4

Each new release of Fedora Core brings with it new possibilities. Red Hat Enterprise and Fedora Core 4: The Complete Reference by Richard Petersen...

Oracle(r) Database 10g Release 2 on Linux Sets World Record TPC-H Benchmark Result in...

Today Oracle announced a new world record TPC-H 300 gigabyte (GB) data warehousing benchmark for Oracle(r) Database 10g Release 2 and Oracle Real...

Protecting Linux against automated attackers

Author: Ryan Twomey As many systems administrators will tell you, attacks from automated login scripts specifically targeting common account names with weak passwords have become...