Search Results

Search found 8634 results on 346 pages for 'base'.

Page 100/346 | < Previous Page | 96 97 98 99 100 101 102 103 104 105 106 107  | Next Page >

  • Le texte sur la neutralité du Net approuvé aux États-Unis, ce cadre réglémentaire fait la distinction entre l'Internet mobile et fixe

    Le texte de loi sur la neutralité du Net approuvé aux États-Unis Ce cadre réglementaire fait la distinction entre l'Internet mobile et fixe Mise à jour du 24/12/2010 La Commission fédérale des communications américaine (FCC) vient de publier les règles sur la neutralité du Net, un document aussi attendu que controversé, adopté par trois voix favorables contre deux mardi. Cette publication révèle un nouvel article qui stipule que les opérateurs de téléphonie mobile ne peuvent bloquer l'accès (pour peu qu'ils soit légaux) "aux applications et services qui peuvent être en concurrence" avec les services de base fou...

    Read the article

  • All About SEO Services

    Technically, it is not in fact an SEO technique, but it is a helpful method for reaching out to new consumers or communicating with your customer base. It is by the use of excellent search techniques that your site is optimized.

    Read the article

  • Is it Worth Opting For the Free SEO Trial by an SEO Company?

    There are a lot of things that work in your favor when you opt for the month of free service that they provide because you at least get a base to start from. If you look carefully, unlike most other companies, the free SEO trial from a SEO company is a non-committal trial which means that if you are not happy with the results after a month you can surely back off.

    Read the article

  • CVE-2014-0191 Denial of Service(DOS) vulnerability in Libxml2

    - by Ritwik Ghoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2014-0191 Denial of Service(DOS) vulnerability null Libxml2 Solaris 11.2 11.2.1.5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Shouldn't tasksel be installed by default?

    - by Neil Trodden
    It just isn't there on the base install of a virtual host I am evaluating from an ISP. Not in path: root@vpstest2:~# tasksel -bash: tasksel: command not found Config files not there: root@vpstest2:~# ls /usr/share/tas* ls: cannot access /usr/share/tas*: No such file or directory It's just .... gone! root@vpstest2:~# whereis tasksel tasksel: I'm a little concerned that the install is broken. Running locate spews this out: locate: can not stat () `/var/lib/mlocate/mlocate.db': No such file or directory

    Read the article

  • Video Now Live! Oracle Partner Days in FY13 Preview

    - by swalker
    The Oracle Partner Days are a one day yearly event taking place in most of the EMEA countries targeted to the key contacts of our partner base. During these events our partners can discover the business opportunities coming from the adoption of the entire Oracle stack, the latest products value propositions and sales strategy, understand the value of attending the EMEA and local partner communities as well as the benefits obtained from the OPN partnership &amp;amp;lt;p&amp;amp;gt; &amp;amp;lt;/p&amp;amp;gt;

    Read the article

  • CVE-2011-3389 Vulnerability in NSS library affects Oracle iPlanet Web Proxy Server

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3389 Unauthorized information disclosure vulnerability 4.3 NSS Oracle iPlanet Web Proxy Server 4.0 SPARC: 145604-04 X86: 145606-04 Linux: 145605-04 Windows: 145607-04 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Which version of Debian are Ubuntu LTS releases based on?

    - by barnac1e
    This answer says: The base of the operating system, Debian, comes in three versions: Stable, Testing and Unstable. Normally, Ubuntu is based on Testing; the LTS releases are based on Stable. That cannot be true then for 12.04 because Debian Stable (Squeeze) is almost going to be old-stable, and it's obvious that the kernel versions in 12.04, packages, etc. cannot have come from Debian Squeeze. So then what other Debian Stable is there for Precise to be based on?

    Read the article

  • Libreoffice 3.5 won't launch from Desktop Shortcut: Ubuntu 11.10 Unity

    - by Aivard
    I've upgraded my Libreoffice to the recent 3.5 version. Before, I was using LO 3.45 and it had no problems on launching from the Desktop Shortcut. Anyways, when I upgraded and tried to create a shortcut from the launcher it reported this, "The application launcher "libreoffice3.5-base.desktop" has not been marked as trusted. If you do not know the source of this file, launching it may be unsafe." Any ideas of fixing this. Thanks in advance: Regards

    Read the article

  • Multiple Denial of Service vulnerabilities in Ghostscript

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-4516 Denial of Service (DoS) vulnerability 6.8 Ghostscript Solaris 10 SPARC: 122259-06 X86: 122260-06 Solaris 11 11/11 SRU 6.6 CVE-2011-4517 Denial of Service (DoS) vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple Vulnerabilities in Thunderbird

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3648 Cross-site scripting (XSS) vulnerability 4.3 Thunderbird Solaris 11 11/11 SRU 04 CVE-2011-3650 Denial of Service(DoS) vulnerability 9.3 CVE-2011-3651 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3652 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3654 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3655 Access Control vulnerability 9.3 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2012-2111 Access Controls vulnerability in Samba

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2111 Permissions, Privileges, and Access Controls vulnerability 6.5 Samba Solaris 11 11/11 SRU 8.5 Solaris 10 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • A memory leak occurs in a .NET Framework 2.0-based application that uses the AesCryptoServiceProvide

    981575 ... A memory leak occurs in a .NET Framework 2.0-based application that uses the AesCryptoServiceProvider classThis RSS feed provided by kbAlerz.com.Visit kbAlertz.com to subscribe. It's 100% free and you'll be able to recieve e-mail or RSS updates for the technologies you pick from the Microsoft Knowledge Base....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Professional Onsite Optimization For a Profitable Business

    For some reason or another onsite optimization is generally one of the services that many webmasters and website owners seem to forget when trying to optimize websites. Onsite optimization is like keyword research one of the most relevant SEO services that stand at the very base of search engine optimization. This basically means that you can't get anything done without first performing a proper onsite optimization.

    Read the article

  • CVE-2012-0698 Denial of Service (DoS) vulnerability in tcsd

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0698 Denial of Service (DoS) vulnerability 5.0 tcsd Solaris 11 11/11 SRU 13.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Horizon

    - by Ritwik Ghoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2014-3473 cross-site scripting (XSS) vulnerability 4.3 OpenStack Horizon Solaris 11.2 11.2.1.5.0 CVE-2014-3474 cross-site scripting (XSS) vulnerability 4.3 CVE-2014-3475 cross-site scripting (XSS) vulnerability 4.3 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Google publie le code source d'Android 4, le kit de développement natif de l'OS supporte désormais les API de cette version

    Google publie le code source d'Android 4 Le kit de développement natif de l'OS supporte désormais les API de cette version Sur la mailing-list d'Android, un ingénieur de Google annonce la publication progressive du code source d'Ice Cream Sandwish sur son serveur Git public, d'où il peut être librement téléchargé. Cette ouverture constitue un pas significatif pour Android, car il s'agit de la première fois qu'une base de code de l'OS, adaptée aux tablettes, soit accessible. Android 4 représente un environnement unifié pour les s...

    Read the article

  • CVE-2011-2524 Directory traversal vulnerability in libsoup

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-2524 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability 5.0 libsoup Solaris 11 11/11 SRU 11.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2011-3439 Denial of Service (DoS) vulnerability in FreeType

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3439 Denial of Service (DoS) vulnerability 9.3 FreeType Font Engine Solaris 11 Contact Support Solaris 10 SPARC: 119812-14 X86: 119813-16 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2011-3597 Improper Input Validation vulnerability in Perl

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3597 Improper Input Validation vulnerability 7.5 Perl Solaris 10 SPARC: 146032-04 X86: 146033-04 Solaris 11 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple vulnerabilities in Apache HTTP server

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0883 Permissions, Privileges, and Access Controls vulnerability 6.9 Apache HTTP server Solaris 10 SPARC: 120543-30 X86: 120544-30 Solaris 11.1 Contact Support CVE-2012-2687 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 2.6 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • qooxdoo 4.0 : le framework JavaScript adopte les Pointers Events, l'équipe unifie les périphériques

    qooxdoo 4.0 : le framework JavaScript adopte les Pointers Events L'équipe unifie les périphériques (Desktop, Mobile et Site Web)qooxdoo est un framework JavaScript basé sur le système de classes. Il est open source et permet le développement d'applications Web dites « riches » (RIA). La principale nouveauté de la version 4.0 concerne les outils GUI des trois types de plate-formes (site Web, mobile et desktop).Événements indépendants du périphérique d'entréeLes applications qooxdoo peuvent désormais...

    Read the article

  • Nouveau forum sur gestionnaires de sources décentralisée (Distributed Version Control System). Posez

    Bonjour, Les DVCS sont en plein essor ces dernières années, et un forum leur est désormais dédié. Avant de poser votre question, n'oubliez pas de consulter les ressources documentaires :La documentation de Git La documentation de Mercurial La FAQ SCM Si vous souhaitez contribuer à la base documentaire francophone sur ce thème, n'hésitez pas à contacter les responsables bénévoles par mail sur conception [AT] redaction [DASH] developpez [DOT] com...

    Read the article

  • CVE-2012-3401 Denial of Service vulnerability in libtiff

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3401 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.8 libtiff Solaris 11 11/11 SRU 12.4 Solaris 10 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

< Previous Page | 96 97 98 99 100 101 102 103 104 105 106 107  | Next Page >