Home Search

red hat - search results

If you're not happy with the results, please do another search

So Many Holes, So Few Hacks

Hole after hole, breach after breach, flaw after flaw is found -- and most of the time, it's in a Windows system. Yet hackers...

Linux Advisory Watch – December 27th 2002

By:  Benjamin D. ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout...

Axis Launches Complete Linux Computer on a Single Chip

Chelmsford, Mass. - Axis Communications, a global leader in network technology, announced today the availability of the AXIS ETRAX 100LX MCM 2+8, a new...

Tracking Tux: Research Round-Up

- By Barbara French, Tekrati - Directions on Microsoft lists Linux among Microsoft's top ten challenges. Evans Data offers developers a chance at a...

No ‘A’ Word In Time

LinuxSecurity.com Contributors writes "Maintaining accurate time is required for security. Many tools and devices exist to ensure that accurate time is maintained on an...

IDC: Tech Bucks, Hack Threats Up

Market researcher IDC pulls out its crystal ball and proclaims its technology market predictions for 2003. But what do competing analysts have to say...

Open Source Christmas?

Rudolf used the break in Santa's surfing to launch into his well prepared speech. "You know Santa, I've been thinking about this whole Christmas...

TOGAF Version 8 (Enterprise Edition) Goes Live

Pradeep Musipatla writes: "The Open Group Architectural Framework (TOGAF) Version 8 Enterprise Edition went live on Friday, 21st of December on the Open Group...

Teaching eBay how free software licensing works

- By John Holroyd - I am Managing Director of a very small UK company. We sell Unix hardware and GNU/Linux software. We are...

Commentary: Teaching Newbies GNU/Linux

- By Tom Chance - In a recent ask Slashdot thread, chrisd asked Slashdot readers how they thought he should present Free Software (FS) on TV,...