Home Search

utilities - search results

If you're not happy with the results, please do another search

Open Source Security: Better Protection at a Lower Cost

Steve Schlesinger, Astaro Corp. At first glance, the idea of using open source software for a firewall or other security application seems counterintuitive, even absurd....

MontaVista Software and Opera 7

Annette Oevermann writes "Oslo, Norway and Sunnyvale, Calif. — Jan 13, 2003 — Opera Software ASA and MontaVista Software, Inc. today announced that the...

The most popular Linux article ever?

- By Robin 'Roblimo' Miller - You've seen a headline or two recently on NewsForge that said something like "Microsoft fights off Windows rival Linux."...

KNOPPIX 3.1 Released

FN-Eagle writes "Version 3.1 of KNOPPIX with KDE 3.0.4 and many other new features has been gone from internal tests to a...

Linux Advisory Watch – December 13th 2002

By:  Benjamin D. ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated...

Linux Advisory Watch – December 13th 2002

By:  Benjamin D. ThomasLinux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated...

Aegir CMS 1.0 beta3 released

Henri Bergius writes "The Aegir CMS development team has released the third public beta of the Aegir CMS Open Source Content Management System." Aegir CMS is a...

Apache in a Bubble

Author: JT Smith - By Jeffrey Costa - According to legend, the name Apache was an amalgam of the phrase "a patchy server". Today the true “patchy” server...

Tracking Tux: Research Round-Up

- By Barbara French, Tekrati - Bloor Research crosses the aisle and declares Linux enterprise-ready. META Group sees signs of changing tides in data center...

Host-Based IDSes: Integrity Checkers

Author: JT Smith - By Michael D. Bauer - Dedicated host-based IDSes tend overwhelmingly to rely on integrity checking. In theory, host-based IDSes should use a...