Home Search
red hat - search results
If you're not happy with the results, please do another search
Crackers and honey: An irresistible combination for network security
Author: Mayank Sharma
Denial of service (DoS) attacks aim to take down Web servers and other Internet resources, often by swarming them with repeated requests,...
Linux kernel, Netscape affected by major zlib security vulnerability
Author: JT Smith
- By Grant Gross -
A buffer overflow vulnerability affecting the PPP code in the Linux kernel, Netscape and up to...
Game over for Loki
Author: JT Smith
"This is the week that Loki Software, Inc., the once-promising Linux games company that came to resemble Enron writ small, disappears beneath
...
TuxBox game tutorial released
Author: JT Smith
vmlinuz writes, "After counless hours of work, here is the TuxBox Game Tutorial. Very early version of course, but it should teach...
Storm Linux
Author: JT Smith
Storm Linux is a Debian GNU/Linux based distribution designed for
the desktop and network markets. Enhancements include the Storm installer,...
Caldera OpenLinux
Author: Benjamin D. Thomas
Caldera Systems, Inc. is the leader in providing
Linux®-based business solutions through its award-winning OpenLinux line of products and...
Yellow Dog Linux
Author: Benjamin D. Thomas
Yellow Dog Linux takes advantage of the most current, stable,
and secure Linux kernel and libraries, and best of...
How we designed a long-lasting web-hosting service on Linux: 3 lessons learned
The decisions we made in designing our Linux web-hosting service (and the tips we gathered along the way) kept it up and running for...