Midnight Commander (MC) is a visual shell and a file manager for text consoles.
LynuxWorks and IBM Driving Linux 2.6 and 64-bit Development in Wide Range of Deeply Embedded Computing Environments
LWN reader Geert Jan van Oldenborgh recently encountered TryOutLinux.com by way of a Google ad. This site, which looks like a another Linux information site, has no affiliation listed on it; it claims copyright in the name of TryOutLinux.com. The ad leads to the "Which Linux is Best?" page, which concludes: "We Recommend LindowsOS for Most Desktop Users and Red Hat or SuSE for File Servers" (caps in the original). So it, perhaps, won't be surprising that the whois information for TryOutLinux.com lists Lindows.com as the registrant.
The GNOME project is expected to release version 2.6 of its open source Linux desktop Wednesday, which supporters call a major step forward in offering choice among desktop players.
PowerPC® processors are found in everything from supercomputers to game consoles and from servers to cell phones -- and they all share a common architecture. This introduction to the PowerPC application-level programming model will give you an overview of the instruction set, important registers, and other details necessary for developing reliable, high performing PowerPC applications and maintaining code compatibility among processors.
A denial of service and a buffer overflow vulnerability have been found in Monit.
The Beaverton-based lab pushes for wider use of the software, according to the group's chief executive
A guide for when and how to use styles instead of manual overrides in OpenOffice.org documents.
Over the past months we have heard about how free and open source software (FOSS) is becoming more and more acceptable in the business community. There has also been a movement to have governments adopt policies that open the door to FOSS. However, it appears that the open source community has overlooked one vital area of the community that would most likely embrace FOSS with open arms, and that is the area of emergency services (Police, Fire and Emergency Medical Services).
Some 75 towns across New South Wales have started accessing the Internet through Linux-based satellite routers in what is said to be largest network of its type in Australia spanning upwards of 800,000 square kilometres.
Seminars to be Taught Nationwide by Leading Intellectual Property Experts
Mbedthis Software today announced support for PHP and the LAMP architecture targeting mobile applications and embedded devices. Mbedthis released an embedded PHP module for its highly secure AppWeb embedded HTTP web server that has been optimized for mobile and embedded applications...AppWeb is available under both an open source GNU license and a commercial license. Support and a security enhancement service are also available.
Avid KDE user and Linux- and Open-Source-advocate Bill Kendrick will be discussing the ways KDE creates a rich, useful and fun user experience for Linux newbies and hackers alike.
R. Hewitt Pate, the U.S. Assistant Attorney General for Antitrust, issued a statement last week about the European Commission's ruling against Microsoft. Far from being on the side of consumers and a free market, Pate's remarks nestle cheek to jowl with the monopolist itself. It even threatens -- on Microsoft's behalf -- the relationship between the United States and the EC if the Europeans dare to act like sovereign nations and put the interests of their citizens ahead of Redmond's. It's like waking up one morning to find your district attorney, who has sworn an oath to protect you from the bad guys, issuing press releases on behalf of the biggest crook in the county.
You have to admit that the job of a system administrator would be made worlds harder if we had to actually sit down in front of each machine we're responsible for. Why bother having a network if you can't use it to make your life easier? Let's have a look at a couple of cool remote administration tools that are both useful and easy to use.
MPlayer contains a remotely exploitable buffer overflow in the HTTP parser that may allow attackers to run arbitrary code on a user's computer.
Fetchmail versions 6.2.4 and earlier can be crashed by sending a specially-crafted email to a fetchmail user.
Stefan Esser reported that Ethereal versions 0.10.1 and earlier contain stack overflows in the IGRP, PGM, Metflow, ISUP, TCAP, or IGAP dissectors. On a system where Ethereal is being run a remote attacker could send malicious packets that could cause Ethereal to crash or execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0176 to this issue.
Squid versions 2.0 through to 2.5.STABLE4 could allow a remote attacker to bypass Access Control Lists by sending a specially-crafted URL request containing '%00': in such circumstances; the url_regex ACL may not properly detect the malicious URL, allowing the attacker to effectively bypass the ACL.
A remotely-exploitable buffer overflow in Midnight Commander allows arbitrary code to be run on a user's computer