Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
20th Anniversary of North America's Largest and Most Comprehensive IT Event Continues to Drive Revolution in Business Technology
Every wise old system and network administrator knows that security is a multilayer process. You have your firewalls and other border security, perhaps some internal network segmentation, and application and operating system security. However, locking down the operating system is probably the most crucial link in this chain.
Corruption of computer magazines? Far-fetched? I don't think so. Correction. I know it is not far-fetched. If you happen to live in Europe, you may have seen many computer magazines this summer that included the Microsoft Office 2007 test suite on CD. You may have bought such a magazine and wondered why they were so friendly to Microsoft.
Authentication is the process in which a program determines whether a user is actually the person who he claims to be. It is used in any kind of a system that provides different services to people depending upon their membership. When you log in to your favorite mailbox, access ATM, or use the services of Net Banking; what you are actually doing is obtaining service from the service provider after proving your credibility using your credentials (i.e. generally your user name and password).
A recent Slashdot item on Wi-Fi security was a timely reminder of the weaknesses of default Wi-Fi encryption protocols, and the dangers of using unencrypted, public Wi-Fi connections. Fortunately, you can use FOSS utilities to securely tunnel your Wi-Fi connection sessions and protect your Web and email traffic.
March is the last date set for the Free Software Foundation's release of the third revision of its General Public License. The open source camp has already made its opposition to the licence fairly clear; the FSF, while admitting that the draft for GPL Version 3 is not yet finalised, is unlikely to compromise on key changes from the existing licence, the very changes that are the major sticking points between the two camps.
Examine how to configure Secure Shell (SSH) on IBM System p and System x computers to run commands in parallel
in a cluster without being prompted for a password. This will allow you to perform activities more easily and quickly, and gives you flexibility to perform activities in parallel on more machines.
So yesterday I went to my boss’ place to install both Kubuntu Dapper and Debian Etch onto his new Asus V2-AH2 box, which really gave us a hard time. But that wasn’t Debian’s or Ubuntu’s fault.
The France-based Zenwalk GNU/Linux development team introduced v3.0, its latest stable major release, on Sept. 8. Zenwalk 3.0, which features a 2.6.17 Linux kernel and the Xfce desktop, is now available for download, as is ZenLive-2.8.1, a bug-fix update to Zenwalk's live CD edition.
A start-up called Simply RISC has built a single-core variant of Sun Microsystems' UltraSparc T1, an indication of interest in Sun's plan to encourage others to adopt and modify open-source designs for the processor.
Linux Networx completed a new round of venture financing Monday, giving the company an additional $37 million to bring its Linux-based, cluster supercomputers to industry and research marketplaces.
This howto will illustrate a way to install and configure Subversion and websvn on a Debian server. With Subversion you have a powerful version control system for your software development, and websvn is an easy-to-use webinterface to your SVN repositories written in PHP.
Ever since Sun announced the inclusion of Java DB, known in the wild as Derby, in the JDK of the Java SE platform, there have been many complaints about it. A recent blog entry (funny URL by the way :) by Simon Morris caught my attention. I understand why one would complain about bloating the JDK with a database, or with the WS stack or even Rhino for that matter.
The Google Summer of Code is over, and final reports have been submitted. Most of our students worked well right up to (and in some cases beyond) the end of the summer, and hopefully we'll see some useful results from their projects coming to light soon. Expect a more detailed summary of what was achieved, coming soon to a d-d-a list near you.
- Red Hat is pleased to announce the availability of the Red Hat Enterprise Linux 5 Beta 1 milestone. This is a public beta. This is the first Red Hat Enterprise Linux release that includes Xen based open source virtualization technology. The Red Hat Enterprise Linux 5 Beta 1 release contains virtualization on the i386 and x86_64 architectures as well as a technology preview for IA64. OSDir has some nice screenshots of Red Hat EL 5 Beta 1 in the Red Hat EL 5 Beta 1 Screenshot Tour
Articles like this one are so misguided
. Giving you a brief overview what the article from ComputerWorld says: Open Source supporters build fortresses around them that make them unapproachable and have infinite animosity toward Microsoft. Yep, that about sums it up. I'll show you below how this article was written by a ignorant journalist...one that probably is too prideful to ask for help when writing his garbage.
The Malaysian Administrative Modernization and Management Planning Unit is ready to move into the second phase of its open source initiative, which is to expand use of the technology to more government agencies.
This whitepaper examines the market potential for hardware add-in cards that interface open telephony systems with the PSTN (public switched telephone network). It also looks at the trends driving businesses to adopt IP telephony systems, and at various popular open source PBXs and other tools.
Being a RISC OS user is an odd experience. It's normally baffling to non-believers why so many (mostly British) computer users persist with the eccentric beast. It's easy to list reasons why no self-respecting geek would trouble with it: many old or under-developed applications, poor streaming media support, lack of compatibility with key standards and technologies, limited hardware support, and there are many more. For most, RISC OS is a thing of the past, a curio, a once-promising minority OS trampled on by the juggernauts of Windows, MacOS and Linux.
[Its got another one of those big MS ads. but it is a decent article. - Scott]
« Previous ( 1 ...
) Next »