Home Search
utilities - search results
If you're not happy with the results, please do another search
Open Source Security: Better Protection at a Lower Cost
Steve Schlesinger, Astaro Corp.
At first glance, the idea of using open source software for a firewall or other security application seems counterintuitive, even absurd....
MontaVista Software and Opera 7
Annette Oevermann writes "Oslo, Norway and Sunnyvale, Calif. — Jan 13, 2003 — Opera Software ASA and MontaVista Software, Inc. today announced that the...
The most popular Linux article ever?
- By Robin 'Roblimo' Miller -
You've seen a headline or two recently on NewsForge that said something like "Microsoft fights off Windows rival Linux."...
KNOPPIX 3.1 Released
FN-Eagle writes "Version 3.1 of KNOPPIX with KDE 3.0.4 and many other new features
has been gone from internal tests to a...
Linux Advisory Watch – December 13th 2002
By: Benjamin
D. ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated...
Linux Advisory Watch – December 13th 2002
By: Benjamin
D. ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the
security vulnerabilities that have been announced throughout the week.
It includes pointers to updated...
Aegir CMS 1.0 beta3 released
Henri Bergius writes "The Aegir CMS development team has
released the third public beta of the Aegir CMS Open Source Content
Management System."
Aegir CMS is a...
Apache in a Bubble
Author: JT Smith
- By Jeffrey Costa -
According to legend, the name Apache
was an amalgam of the phrase "a
patchy server". Today the true “patchy” server...
Tracking Tux: Research Round-Up
- By Barbara
French, Tekrati -
Bloor Research crosses the aisle and declares Linux enterprise-ready. META Group sees signs of changing tides in data center...
Host-Based IDSes: Integrity Checkers
Author: JT Smith
- By Michael D. Bauer -
Dedicated host-based IDSes tend overwhelmingly to rely on integrity checking. In theory, host-based IDSes should use a...