Search Results

Search found 57588 results on 2304 pages for 'jack desai@oracle com'.

Page 424/2304 | < Previous Page | 420 421 422 423 424 425 426 427 428 429 430 431  | Next Page >

  • Des chercheurs dévoilent un prototype d'Internet du futur, reposant sur une architecture sans serveur, complètement décentralisée

    Des chercheurs développent un prototype de réseau d'architecture complètement décentralisée qui fera passer les attaques DoS pour des mauvais souvenirsUne équipe de chercheur de l'université de Cambridge a pour intention de remplacer le modèle relationnel client-serveur dont dépendent de nombreux services, applications et protocoles d'internet, par une architecture complètement décentralisée du réseau des réseaux. Le projet ambitieux se nomme Pursuit, et un prototype de l'internet de demain conçu...

    Read the article

  • Two front ends for Clamav

    <b>Experimenting with GNU/Linux:</b> "There are several graphical front ends for clam av which can make your life easy. The most popular among them are clamtk and Klamav."

    Read the article

  • Le premier virus sur PC a 25 ans, le Directeur du Laboratoire de Recherche de F-Secure retrace son histoire en vidéo depuis le Pakistan

    Le premier virus sur PC a 25 ans L'éditeur F-Secure retrace son histoire en vidéo En collaboration avec Gordon Fowler Le premier virus ayant infecté un PC a été découvert en 1986. Et curieusement pour aujourd'hui, ce virus contenaient les contacts de ses auteurs au Pakistan. A l'occasion de cet anniversaire, Mikko Hyppönen, Directeur du Laboratoire de Recherche de F-Secure, s'est donc rendu dans la ville de Lahore au Pakistan pour retrouver ces créateurs, deux frères, Amjad et Basit Farooq Alvi. qui sont aujourd'hui à la tête d'un FAI florissant (Brain Telecommunication Ltd). F-Secure propose un reportage v...

    Read the article

  • Austin Group Prepares for Linux Against Poverty

    <b>Blog of Helios:</b> "For those that do not know, Linux Against Poverty is an annual event organized by Lynn Bender that gathers some of the top tech people in the area and assembles them to evaluate, triage, repair and then install the Linux Operating System on those computers."

    Read the article

  • Firefox keeps crashing

    - by RainThePain
    When I open FireFox it crashes about 5 seconds later, and this is the error: Add-ons: globalmenu%40ubuntu.com:3.6.4,langpack-en-GB%40firefox.mozilla.org:17.0.1,langpack-en-ZA%40firefox.mozilla.org:17.0.1,langpack-zh-CN%40firefox.mozilla.org:17.0.1,ubufox%40ubuntu.com:2.6,%7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:17.0.1 BuildID: 20121129151842 CrashTime: 1355583809 EMCheckCompatibility: true FramePoisonBase: 7ffffffff0dea000 FramePoisonSize: 4096 InstallTime: 1355581168 Notes: OpenGL: X.Org -- Gallium 0.4 on AMD RS780 -- 2.1 Mesa 9.0 -- texture_from_pixmap ProductID: {ec8030f7-c20a-464f-9b0e-13a3a9e97384} ProductName: Firefox ReleaseChannel: release SecondsSinceLastCrash: 598 StartupTime: 1355583804 Theme: classic/1.0 Throttleable: 1 URL: http://shop.ubuntu.com/ Vendor: Mozilla Version: 17.0.1 This report also contains technical information about the state of the application when it crashed.

    Read the article

  • MySQL Exotic Storage Engines

    MySQL has an interesting architecture that allows you to plug in different modules to handle storage. What that means is that it's quite flexible, offering an interesting array of different storage engines with different features, strengths, and tradeoffs. Sean Hull presents some of the newest and more exotic storage engines, and even some that are still in development.

    Read the article

  • MySQL Exotic Storage Engines

    MySQL has an interesting architecture that allows you to plug in different modules to handle storage. What that means is that it's quite flexible, offering an interesting array of different storage engines with different features, strengths, and tradeoffs. Sean Hull presents some of the newest and more exotic storage engines, and even some that are still in development.

    Read the article

  • MySQL Exotic Storage Engines

    <b>Database Journal:</b> "MySQL has an interesting architecture that sets it apart from some other enterprise database systems. It allows you to plug in different modules to handle storage. What that means to end users is that it is quite flexible, offering an interesting array of different storage engines with different features, strengths, and tradeoffs."

    Read the article

  • iOS ou Android, quelle est la plate-forme la plus sécurisée ? Symantec penche en faveur d'iOS malgré ses failles 10 fois plus nombreuses

    iOS ou Android, quelle est la plate-forme mobile la plus sécurisée ? Symantec penche en faveur d'iOS en dépit de ses vulnérabilités 10 fois plus nombreuses La sécurité des plateformes mobiles est certes meilleure que celle des ordinateurs, mais elle reste insuffisante d'après le nouveau rapport de Symantec intitulé « regard sur la sécurité des périphériques mobiles : analyse des approches de sécurités employées sur Apple iOS et Google Android ». Ce document de 23 pages affirme sans surprise que les périphériques mobiles offrent formellement plus de sécurité que les plateformes Desktop, pour peu que l'on ne transgresse pas les lignes de conduite imposées par les éditeurs de ...

    Read the article

  • Juju bootstrap fails with "Temporary failure in name resolution" using Amazon AWS

    - by Will
    I have followed the instructions over at https://juju.ubuntu.com/docs/config-aws.html to try and setup myself with a juju environment. It all seemed to setup alright. SSH keys, Gererate config, repository, adding access id and secret keys to environments.yaml file. Although my key file from aws IAM management console was called credentials.csv rather than rootkey, I couldn't find that link described in the documentation. When I give the command juju bootstrap in the testing page. It fails giving me the error: juju bootstrap ERROR Get https://s3-us-west-1.amazonaws.com/juju-gobblygookmynukmbersinhere/provider-state: lookup s3-us-west-1.amazonaws.com: Temporary failure in name resolution (note I just replaced my numbers for this posting my actual terminal has my numbers in. This is my first attempt at any ec2 work so I have gone in and created new IAM profiles. What have I done wrong? Any help would be great. I think I'm in over my head!

    Read the article

  • Redirect a url to another url in IIS 7.5

    - by Jason White
    I have no idea why this isn't working. I've tried creating map rules and then rewritng and redirecting the url. I've tried just redirecting it with a simple rewrite rule and no matter what, the only time I can get it to work is if I set the match url to match this regex .*. I'm trying to redirect webmail.example.com to mail.example.com. Seemed like it would have taken but a couple seconds; boy was I wrong. I'm thinking I must be doing something wrong with the regex, but I'm not sure what as when I test it it seems to work fine. <rule name="webmail" patternSyntax="ECMAScript" stopProcessing="true"> <match url=".*webmail.*" /> <conditions logicalGrouping="MatchAll" trackAllCaptures="false"> </conditions> <action type="Redirect" url="https://mail.example.com:8000" appendQueryString="false" logRewrittenUrl="true" /> </rule> Thanks

    Read the article

  • Fedora 13 Alpha released

    <b>Test-Announce:</b> " The Fedora 13 "Goddard" Alpha release is available! What's next for the free operating system that shows off the best new technology of tomorrow? You can see the future now..."

    Read the article

  • Try the Linux desktop of the future

    <b>Tux Radar:</b> "For the tinkerers and testers, 2010 is shaping up to be a perfect year. Almost every desktop and application we can think of is going to have a major release, and while release dates and roadmaps always have to be taken with a pinch of salt, many of these projects have built technology and enhancements you can play with now."

    Read the article

  • Pwn2Own : un iPhone piraté en 20 secondes, pour en copier tous les SMS

    Pwn2Own : un iPhone piraté en 20 secondes, pour en copier tous les SMS Lors du concours de hacking Pwn2Own, la base de donnée qui contient les SMS de l'iPhone n'a pas tenu longtemps. Deux hackers, enzo Iozzo et Ralf Philipp Weinmann, ont réussi à s'y introduire et à en copier tout le contenu (y compris les SMS qui avaient été effacés) en redirigeant les utilisateurs vers un site web compromis. Tout cela en un temps record, puisqu'il leur a suffit de 20 secondes pour aspirer toutes les données de cette base de données de l'iPhone. leur technique pourrait également permettre d'accéder aux contacts, photos, fichiers audio, etc... du smartphone. Les deux hommes ont reçu 15.000 $ pour leur victoire, et les ...

    Read the article

< Previous Page | 420 421 422 423 424 425 426 427 428 429 430 431  | Next Page >