Home Search

red hat - search results

If you're not happy with the results, please do another search

Worms Turn on Military Networks

The alleged weak security measures in Microsoft products and the company’s near-monopoly over key software markets drew the ire of a group of security...

Microsoft’s Ballmer attempts to wean China from Linux

IN THE FACE of growing competition from Linux and Sun in the Chinese market, Microsoft's Steve Ballmer has started a campaign to win...

Bill Gates beats back bugs

Viruses threaten Microsoft's brand and its bottom line Security-software firms are caught in the crossfire When the Blaster and SoBig viruses hit the Internet in August,...

Debian attacker may have used new exploit

An as-yet-unknown security exploit in Linux may have been responsible for a recent compromise of Debian.org's servers, according to a system ...

A modified license for Free Software fairness

Author: Apurva Mehta We should not be misled by the apparent success of Free Software projects today. The popular Free Software licenses, such as the GNU GPL...

2004: The Year Linux Grows Up (or Blows Up)

sjvn writes "eWEEK.com's Linux & Open-Source Center Editor Steven Vaughn-Nichols really likes what he sees for the server, corporate and retail desktop horizon for...

SENTINIX Gives the Boot to Monitoring Woes

Bruce Knox writes " SENTINIX gives the boot to monitoring woes by artfully using a collection of best of class free software products. Download...

FAQ: 12 Questions about OpenOffice

Kelly McNeill writes "The OpenOffice software suite is one of the many rapidly growing open source projects that has been making headway into new...

MEPIS LLC announced the release of MEPIS Linux 2003.10 for Pentium processors

Morgantown, WV; November 25th 2003 - Today, MEPIS LLC announced the release of MEPIS Linux 2003.10 for Pentium processors. MEPIS Linux is a desktop Linux that...

Five IE Vulnerabilities Could Mean System Takeover: Chinese Researcher

Five "serious vulnerabilities" in Microsoft Internet Explorer could mean an exploit provoking a system takeover, according to a Chinese researcher who says...