Home Search
red hat - search results
If you're not happy with the results, please do another search
‘Format string’ vulnerabilities affect Linux, Unix
Author: JT Smith
Security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers take full control of computers....
Unix, Linux computers vulnerable
Author: JT Smith
CNET News is reporting, security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers...
PCs, notebooks to get a memory speed boost
Author: JT Smith
ZDNet News:
Several semiconductor manufacturers have announced plans to build chipsets for Intel and AMD processors that support Double Data Rate SDRAM, or...
Subtle Linux infiltration
Author: JT Smith
By Robin "roblimo" Miller
Editor in Chief
Imagine buying a network card and getting a free Linux CD. Or buying a copy of the...
King of the Mountain
Author: JT Smith
by Emmett Plant
NewsForge Columnist
When I was growing up in Doylestown, we used to play a game in the snow
called king of the...
Judge: MP3.com must pay millions
Author: JT Smith
A federal judge found Wednesday that MP3.com Inc. willfully infringed on copyrights belonging to Seagram Co.'s Universal Music Group in a ruling...
Broadcast your videos on Lycos
Author: JT Smith
VideoCenter, a free video broadcasting service that lets you upload, edit, and stream videos captured on a PC Web camera or a...
Hackers download Mercury songs
Author: JT Smith
Ananova reports that record company bosses had to step up security on their websites after fans were able to hack into unreleased...
KDE response to Stallman editorial
Author: JT Smith
In a recent editorial on Linux Today, Richard Stallman claimed that KDE is still in violation of the
...
Tech sex is great (ab)normalizer
Author: JT Smith
As the two-day
Next Sex symposium wrapped up on Monday evening, this somewhat...