Home Search

red hat - search results

If you're not happy with the results, please do another search

‘Format string’ vulnerabilities affect Linux, Unix

Author: JT Smith Security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers take full control of computers....

Unix, Linux computers vulnerable

Author: JT Smith CNET News is reporting, security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers...

PCs, notebooks to get a memory speed boost

Author: JT Smith ZDNet News: Several semiconductor manufacturers have announced plans to build chipsets for Intel and AMD processors that support Double Data Rate SDRAM, or...

Subtle Linux infiltration

Author: JT Smith By Robin "roblimo" Miller Editor in Chief Imagine buying a network card and getting a free Linux CD. Or buying a copy of the...

King of the Mountain

Author: JT Smith by Emmett Plant NewsForge Columnist When I was growing up in Doylestown, we used to play a game in the snow called king of the...

Judge: MP3.com must pay millions

Author: JT Smith A federal judge found Wednesday that MP3.com Inc. willfully infringed on copyrights belonging to Seagram Co.'s Universal Music Group in a ruling...

Broadcast your videos on Lycos

Author: JT Smith VideoCenter, a free video broadcasting service that lets you upload, edit, and stream videos captured on a PC Web camera or a...

Hackers download Mercury songs

Author: JT Smith Ananova reports that record company bosses had to step up security on their websites after fans were able to hack into unreleased...

KDE response to Stallman editorial

Author: JT Smith In a recent editorial on Linux Today, Richard Stallman claimed that KDE is still in violation of the ...

Tech sex is great (ab)normalizer

Author: JT Smith As the two-day Next Sex symposium wrapped up on Monday evening, this somewhat...