Home Search
vector linux - search results
If you're not happy with the results, please do another search
VectorLinux 4.3 RC1 released
SilentBob4 writes " We learned early this morning that the first release-candidate of VectorLinux 4.3 is now available for your consumption. This release boasts...
LinuxQuestions.org adds a VectorLinux Forum
jeremy writes "LinuxQuestions.org has added a VectorLinux forum that is officially recognized by VectorLinux. The forum joins officially recognized forums for Slackware, Red Hat,...
VectorLinux 4.0 Download Edition
Anonymous Reader writes "Tux Reports reviews the VectorLinux 4.0 Download Edition and includes and interview with the originator of the distribution."
Link: tuxreports.com
Category:
Linux
VectorLinux 4 against all odds
Author: Adam Doxtater
Well, it's that time again. The developers of VectorLinux have released version 4.0 of their acclaimed Slackware derivative and have delivered a...
Interview with the Developer of VectorLinux
mangeli writes "We recently got the chance to give you yet another interview with one of the players in the linux world! This time,...
A look at VectorLinux 2.0
Author: JT Smith
Avatar writes "Evil3D has posted a new review today. The review covers the recently released 2.0 version of VectorLinux:
"One of the...
VectorLinux 1.8
Author: JT Smith
Linux PR has a press release announcing VectorLinux, a small X-based distribution.
Linux Foundation Announces OpenSearch Software Foundation to Foster Open Collaboration in Search and Analytics
AWS transfers OpenSearch to the Linux Foundation to support a vendor-neutral community for search, analytics, observability, and vector database software.
Read more at linuxfoundation.org
How to Manage Linux Endpoints with Automation
Endpoint security is traditionally treated separately from the broader network security plan, and usually falls under responsibility of the IT admins team rather than...
Kali Linux Is the Complete Toolbox for Penetration Testing
Every IT infrastructure offers points of attack that hackers can use to steal and manipulate data. Only one thing can prevent these vulnerabilities from...