Contribute  :  Calendar  :  Advanced Search  :  Site Statistics  :  Directory  :  About  :  Cartoons  :  Web Resources  :  Polls  
    geekinfo.net ...for all that other stuff    
 Welcome to geekinfo.net
 Monday, August 21 2017 @ 04:37 CEST

Sony to release Linux Playstation 2 in U.S.

  View Printable Version 
GNU/LinuxSAN JOSE, CALIFORNIA - Sony Computer Entertainment Inc will launch a Linux-enabled version of its PlayStation 2 in the U.S. market, an executive from the company said Monday.

In the opening keynote at the Rambus Developer Forum here, Shin'ichi Okamoto, senior vice president and chief technical officer said that although he couldn't provide a U.S. release date yet, "we'll be able to announce it soon."

A kit allowing the PlayStation 2 to run Linux was announced for the Japanese market in May, with a launch scheduled for June. At that time, company executives had not solidified plans for a U.S. launch of the kit.

IDG.net has the full story.
 
Post a comment
Comments (6)

Fujitsu to bring Transmeta laptop to U.S.

  View Printable Version 
NewsTransmeta got some welcome news Monday as Fujitsu announced it is bringing to the United States a notebook PC using the latest low-power Crusoe processor from the struggling chipmaker.
Full story at news.com
 
Post a comment
Comments (0)

Answer to Microsoft's "Information Anarchy"

  View Printable Version 
SecurityElias Levy, former moderator of BUGTRAQ, answers Microsofts Scott Culp over his recent essay on www.microsoft.com. Where? On securityfocus.com.
 
Post a comment
Comments (0)

Anti-Spammers Threaten: You Think MAPS Is Bad?

  View Printable Version 
E-mail marketers may soon yearn for the days when Mail Abuse Prevention System LLC was their biggest pain in the neck, according to sources from the anti-spam camp.

In the wake of the recent settlement between Experian eMarketing and MAPS, some Internet service providers have begun subscribing to other so-called block lists, or lists of suspected spammers that ISPs use to filter unwanted e-mail. And these other lists' maintainers are not nearly as friendly as the folks at MAPS, sources say.

Read the full story over at DMNews.
 
Post a comment
Comments (0)

Red Hat Linux 7.2 available

  View Printable Version 
GNU/LinuxRed Hat 7.2 uses the 2.4.7 kernel, so the stability freaks out there should be catered for. There is a press release about this release at Red Hat's site.

To download, check out Red Hat's mirror sites. The whole thing takes about 900Mb.
ZDnet called 7.2 "pain-free Linux" in their review.
 
Post a comment
Comments (0)

geekinfo.net to bolster site security

  View Printable Version 
NewsThe world is on the verge of both war and Windows XP. This is our plan.
 
read more (249 words) Post a comment
Comments (1)

Psionic Portsentry 1.1, the defender of the ports

  View Printable Version 
SecurityLinuxFocus presents the story about PortSentry:
"Psionic portsentry is part of the Abacus Project suite of tools (beside portsentry, the suite offers logcheck and hostsentry). It's an IDS (Intrusion Detection System) dedicated to portscan detection and active defense. It works on many Unix flavors including Mac OS X. The main feature of an IDS is to inform the sysadmin about intrusion attempts. Portsentry goes further since it can react on an attack. The latest version (1.1) of this great tool is available from http://www.psionic.com, and by the way, version 1.0 is now part of some main Linux distributions (Debian, RedHat...)."
Read the full story.
 
Post a comment
Comments (0)

Will Tinky Winky use XP?

  View Printable Version 
WindowsYou might have seen it already, but don't you think the standard backdrop in Windows XP look just a tiny weeny little bit like the place the Teletubbies live in? Kelly McNeill at osopinion.com investigates further :-)
 
Post a comment
Comments (0)

A Sysadmin's Security Basics

  View Printable Version 
SecurityFrom Linux Devcenter over at O'Reilly Network comes this article:
System administrators are no longer alone in their concern for security. The increase in high-profile virus attacks, and a general sense of heightened security, means that executives are likely to have security on their mind. It may be easier than ever to enlist their support for securing our networks and systems, and they may be more likely to put up with some inconvenience for users if it means tighter security.

This article gives an overview of the basics necessary to secure your network, including:
  • Passwords
  • Email attachments and client settings
  • Firewalls and demilitarized zones
  • Securing insecure protocols
  • Wireless
  • Staying informed
Consider this a checklist to reenergize your efforts or to get you started.

(Although it's on a Linux site, the article isn't platform or OS specific, so it makes for good reading for all walks of geek. -twa)
 
Post a comment
Comments (0)

Harvesting passwords from DSL routers

  View Printable Version 
SecurityThe Register:
Hackers have developed a trick for pilfering DSL account names and passwords right from subscriber's routers, a technique that provides hackers with untraceable Internet access, and potentially exposes subscriber email to interception.
 
read more (61 words) Post a comment
Comments (0)
 Copyright © 2017 geekinfo.net
 All trademarks and copyrights on this page are owned by their respective owners.
Powered By Geeklog 
Created this page in 0.06 seconds