Home Search
red hat - search results
If you're not happy with the results, please do another search
Free software funding proposal
Author: JT Smith
proclus writes: "I
submitted this suggestion to Pat McGovern of SourceForge. He is a really busy guy, so don't hold your breath, but...
LynuxWorks responds to Microsoft attack on embedded Linux
Author: JT Smith
Anonymous Reader writes "Embedded Linux vendor LynuxWorks joined the growing chorus of responses to Microsoft's recent efforts to portray Embedded Linux as...
California supreme court will hear DVD-copying appeal
Author: JT Smith
ComputerUser.com: "On August 7, the Court of Appeal in the Sixth Appellate District of California said a lower-court judge was correct in...
EnGarde: ‘glibc’ globbing buffer overflow
Author: JT Smith
EnGarde: "While researching the recent globbing bugs in wu-ftpd, Flavio Veloso
flaviovs@magnux.com> discovered (with the assistance of Jakub Jelinek
jakub@redhat.com>)...
Netegrity embeds Covalent’s Apache-based Web technology into SiteMinder Secure Proxy Server
Author: JT Smith
Covalent, the leader in enterprise
solutions for the Apache Web server, and Netegrity, Inc. (Nasdaq: NETE), the
leading provider of...
Microsoft’s cookie monster
Author: JT Smith
BusinessWeek: "Whatever you think of Microsoft, there's no escaping the
...
Frog freshens up Microsoft’s overbearing image
Author: JT Smith
NewsFactor Network writes: "Since Microsoft released Windows XP last October, one defining factor that has helped soften the company's overbearing image is...
Virtual keyboards to fight FBI Magic Lantern
Author: JT Smith
Marcin Kurzawa writes: "Half a day after FBI confirmed the existence of the Magic Lantern project (on Dec 12) CryptoHeaven released v1.0...
LinuxWorld 2002 could see some turbulence, but officials are positive
Author: JT Smith
- by Tina Gasperson -
LinuxWorld Conference & Expo is about to enter its fourth year of existence. After three years of soaring...
LinuxSecurity.com reviews the Honeynet Project’s Know Your Enemy book
Author: JT Smith
LinuxSecurity Contributors writes "The Honeynet Project's first book details how a honeynet works, how to analzye the data once
...