Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 ... 7359 ) Next »
Dave Whitinger: Inventing Linux News Reporting
Dave's return to the limelight started with his new site, LXer.com. After some preliminary catching up, he finally agreed to do an intervew with me. Out of the Linux spot light, he has created web sites such as Dave's Garden, the largest database of plant listings and images in the world. He admits his passion for Linux, though. Fortunately we have him back.
Report from KDE World Summit, Day 8: End of the marathon
Day eight of aKademy marked the end of the coding marathon. As though restless with their desktop, KDE hackers turned their attention to a tutorial in live cracking, an impromptu demonstration of command line tools, and a brief rootkit panic. Despite the shift in focus, I found some time to talk to some members of the documentation team about their plans.
Email Sender ID: It's like Kerberos all over again
We received a lot of interesting feedback in comments and email as a result of the story we ran last week on Email Sender ID: the hype and the reality." Many of those who contacted us are intimately acquainted with the subject matter, having had personal, first-hand involvement in the process to date. One of those was Yakov Shafronovich, who co-chaired the Anti-Spam Research Group during 2003, when the group was considering this very issue, prior to passing it on to the IETF. That led to an exchange of email messages during which I got a much clearer look at how Microsoft is once again embracing, extending, and attempting to encumber open source technology. Doggone it, it looks like Kerberos all over again.
Securing Web services: Foundations and specifications
Web services, by definition, are particularly vulnerable to breaches in security. The flow of potentially sensitive data not only between machines, but between enterprises and across untrusted networks, presents the need for special attention to areas such as message confidentiality, message integrity, authentication, and authorization. Additionally, since Web services are well suited to business-to-business communications and cooperation, there should be some way to enforce trust relationships between business partners. Finally, Web services are used not only by humans, but by other Web services as well. The high degree of automation required for interaction between Web services requires well-designed software architectures, preferably built upon well-designed standards.
Microsoft's Sender ID rated incompatible to Open Source
Indeed, if the framework is looking less appealing right now, it's only because some say that Microsoft's licensing terms are incompatible with Open Source.
ATI Petition for Adequate Drivers in Linux
Linuxlookup.com is reporting an online petition to ATI Technologies Inc. The community will no longer endure ATI's poor driver support for Linux both in 32-bit and 64-bit computing. This petition is aimed at the designers at ATI who for whatever reason choose not to acknowledge our pleas and specifically at ATI as a company. The signers of this petition will no longer purchase ATI products until ATI make a workable 3D accelerated 64-bit driver for Linux and a 32-bit that utilizes the full potential of the Raedon chips.
Nmap 3.70 released. Nmap is a port scanner utility for security auditing and network exploration
The scanning engine has been rewritten and is now faster, gentler against target hosts and now able to scan many hosts in parallel.
Microsoft v/s Linux: Matrix Reloaded
comparison. The analysis shows that Windows is more secure than four key Linux distributions (MandrakeSoft, Debian, SuSE and Red Hat).
« Previous ( 1 ... 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 ... 7359 ) Next »