Authentication+files+linux

Showing results 1 to 20 of 44

Verifying your GNU/Linux installation downloads

Over the years I have not really paid much attention to verifying downloads for the GNU/Linux installation discs when I download them. I used to just download the ISO files, burn them, and sometimes I would use the self-verifying media check that Red Hat does at the very beginning of the installation process.

November 8, 2011 by

Microsoft declares victory over Linux, names Apple and Google main rivals

Normally, reading a company's annual report is an exercise in sheer boredom. But this year Microsoft's lawyers allowed some actual competitive insight to sneak into the 10-K reports it files with the SEC. Linux has been neutralized, and Apple is first on the list of archrivals.

August 14, 2011

Rigged podcasts can leak your iTunes username/password

Hackers can create malicious podcasts to hijack usernames and passwords from Apple's iTunes software.According to a warning from Apple, a "design issue" in the iTunes podcast feature can be abused via rigged audio files to cause an authentication dialog to be presented to the user.

March 11, 2009 by

Google Desktop for Linux

Developed in Google's Beijing engineering office, Google Desktop for Linux is ready for prime time. This software is finally available on all major operating systems (Windows, Mac and Linux) -- providing quick access to files on your computer through the desktop search utility.

June 27, 2007 by

GDrive is Platypus

Corsin Camichel has stumbled across a page hosted on Google's server (the page has now been removed) that gives life to a service that has been in the rumor mill since my very first blog post last September.  The screenshot provided appears to suggest GDrive works with Windows, Mac and Linux allowing users to store files remotely so they can be accessed from anywhere.

July 10, 2006 by

Is Vista UAP getting a bum rap?

Windows Vista UAP attempts to wean Windows users away from running their computers as a system administrator by asking them to elevate their permissions for system level operations. Mac OS X and Linux do the same thing by asking for administrative rights when needed so why is UAP getting a bum rap? The truth is that UAP actually goes further than any other operating system by protecting your user files as well and not just the system files.

May 7, 2006 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories