Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
<b>Linux Magazine:</b> "Last article we introduced the SMART capabilities of hard drives (who knew your drives were SMART?). In this article smartmontools, an application for examining the SMART attributes and trigger self tests, is examined."
Google patches Chrome for eight vulnerabilities that could have left users at risk. The fixes come just as white hat hackers are set to go to town in a vulnerability search contest.
<b>ZDNet:</b> "The search for the next-generation video codec for the open web has reached an impasse. Few of the options are truly open or free, and those that are free are not being pushed by the major forces."
<b>Blog of Helios:</b> "But to quote Yoda, "Short of native game choices we are." There's a reason for that...I mean aside from the myth that the Linux market is too small to support game development."
Panda Security's latest report says banker Trojans represent more that 60 percent of new cyber security threats, while traditional viruses are making a comeback.
The latest threat to data center security isn't really an IT threat at all. Today's biggest threat is an underground economy fueled by stolen data and the pursuit of maximum criminal financial gain.
<b>Groklaw:</b> "So. Now I know. Now we all know. Blake Stowell, then the PR guy for SCO, sent an email to Maureen O'Gara, saying "I need you to send a jab PJ's way," and then right afterwards she wrote that invasive so-called expose, in which she revealed, or at least intended to reveal, things like who I called on my phone."
Apache AXIOM (AXis2 Object Model) is a pull-based, XML Infoset-compliant object model that supports on-demand building of the object tree. Learn the basis of Axiom and how to use it.
The rugged switches and routers that drive networks on oil rigs, power stations and research operations in Antarctica don't always feature high-end enterprise capabilities. Sixnet is out to change that.
<b>Stop:</b> "In order to solve this problem, Education Minister Mariastella Gelmini proposed to deduce cost (and weight!) of textbooks by encouraging schools to adopt digital textbooks starting from 2011."
<b>Jim Lynch:</b> "Hmm. It seems that one VERY prominent platform is missing. Yep, that's right. Amazon still has not released a Kindle application for Linux."
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.