Home Search
red hat - search results
If you're not happy with the results, please do another search
So Many Holes, So Few Hacks
Hole after hole, breach after breach, flaw after flaw is found -- and most of the time, it's in a Windows system. Yet hackers...
Linux Advisory Watch – December 27th 2002
By: Benjamin D.
ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the security
vulnerabilities that have been announced throughout...
Axis Launches Complete Linux Computer on a Single Chip
Chelmsford, Mass. - Axis Communications, a global leader in network technology, announced today the availability of the AXIS ETRAX 100LX MCM 2+8, a new...
Tracking Tux: Research Round-Up
- By Barbara French, Tekrati -
Directions on Microsoft lists Linux among Microsoft's top ten challenges. Evans Data offers developers a chance at a...
No ‘A’ Word In Time
LinuxSecurity.com Contributors writes "Maintaining accurate time is required for security. Many tools and devices exist to ensure that accurate time is maintained on an...
IDC: Tech Bucks, Hack Threats Up
Market researcher IDC pulls out its crystal ball and proclaims its technology market predictions for 2003. But what do competing analysts have to say...
Open Source Christmas?
Rudolf used the break in Santa's surfing to launch into his well prepared speech. "You know Santa, I've been thinking about this whole Christmas...
TOGAF Version 8 (Enterprise Edition) Goes Live
Pradeep Musipatla writes: "The Open Group Architectural Framework (TOGAF) Version 8 Enterprise Edition went live on Friday, 21st of December on the Open Group...
Teaching eBay how free software licensing works
- By John Holroyd -
I am Managing Director of a very small UK company. We sell Unix hardware and GNU/Linux software. We are...
Commentary: Teaching Newbies GNU/Linux
- By Tom Chance -
In a recent ask Slashdot thread, chrisd asked Slashdot readers how
they thought he should present Free Software (FS) on TV,...