Skip to main content

Home/ Linux/ Group items matching "protection" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
bryan yu

How to protect media file using Apache module rewrite in FreeBSD - 0 views

  •  
    The main purpose in writing this article is to share how to protect media files. That is because I discovered that someone will copy my entire article and then paste it into their own Blog. In fact, we can not prevent it to happen. So I have to use the rewrite module of apache server to stop it. If you are using your machine as a web server...
toololo

DDoS Protection With IPtables: The Ultimate Guide - 0 views

  •  
    There are different ways of building your own anti-DDoS rules for iptables. We will be discussing the most effective iptables DDoS protection methods in this comprehensive tutorial.
Luciano Ferrer

Master PDF Editor for Linux - 0 views

  •  
    * Create new PDF or edit existing ones. * Add and/or edit bookmarks in PDF files. * Fast and simple PDF forms fill out. * Changing font attributes (size, family, color etc). * Encrypt and/or protect PDF files using 128 bit encryption. * Convert XPS files into PDF. * JavaScript support. * Dynamic XFA form support. * Validation Forms and Calculate Values. * Add PDF controls (like buttons, checkboxes, lists, etc.) into your PDFs. * Import/export PDF pages into common graphical formats including BMP, JPG, PNG, and TIFF. * Signing PDF documents with digital signature, signatures creation and validation. * Free PDF Editor on Linux ( for non-commercial use)
  •  
    * Create new PDF or edit existing ones. * Add and/or edit bookmarks in PDF files. * Fast and simple PDF forms fill out. * Changing font attributes (size, family, color etc). * Encrypt and/or protect PDF files using 128 bit encryption. * Convert XPS files into PDF. * JavaScript support. * Dynamic XFA form support. * Validation Forms and Calculate Values. * Add PDF controls (like buttons, checkboxes, lists, etc.) into your PDFs. * Import/export PDF pages into common graphical formats including BMP, JPG, PNG, and TIFF. * Signing PDF documents with digital signature, signatures creation and validation. * Free PDF Editor on Linux ( for non-commercial use)
Djiezes Kraaijst

Legal Pad - Fortune on CNNMoney.com - 0 views

  • A no-fly zone to protect Linux from patent trolls
  • initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products.
  • call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group’s attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a “defensive publication.”
  • ...5 more annotations...
  • In effect, the defensive-publications initiative mounts a preemptive attack upon those who would try to patent purported software inventions that are not truly novel — i.e., innovations that are already known and in use, though no one may have ever previously bothered to document them, let alone obtain a patent on them, a process usually requiring the hiring of attorneys as well as payment of significant filing fees.
  • The Linux Defenders program is largely the brainchild of Bergelt, who took over as Open Invention Network’s CEO this past February. The program also reflects a new, more proactive role Bergelt envisions for OIN than the group has played in the past.
  • The Linux Defenders program will actually have three components. The first will be a peer-to-patent component that, like New York Law School’s existing program, will reach out to the open-source community in search of evidence of “prior art” — proof of preexisting knowledge or use of certain inventions — that can be used to challenge applications for patents that have been filed but not yet granted.
  • The second component will be a natural extension of the first, to be known as “Post-Grant Peer to Patent,” which will enlist similar community assistance in the search for prior art relevant to patents that have already actually issued. In this case, the goal would be — assuming such prior art is found — to initiate an administrative reexamination proceeding before the U.S. PTO to get the patent invalidated
  • The third component is the defensive-publications initiative.
  •  
    On Tuesday a consortium of technology companies, including IBM (IBM), will launch a new initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products. The most novel feature of the new program, to be known as Linux Defenders, will be its call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group's attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a "defensive publication."
Sandra Nowakowski

Cisco SNMP - 0 views

  •  
    |mg| Cisco Snmp Tool 2.2.0 Download Freeware And Shareware Software Utilities. Download Files For Your Computer That Tweak, Repair, Enhance, Protect Majorgeeks.com/cisco_snmp_tool_d5488.html Cisco: Cisco Network And Configuration Management; Spe...
Roberto Pla

FedTech: Simple Security on the Go - 0 views

  •  
    The Air Force Research Lab creates a tool to protect the network when users log in remotely. By Matt McLaughlin
krowddigital

What is Cyber Security? - 1 views

  •  
    Cyber security is a combination of technology, processes, and practices to protect networks, devices and programs
1 - 9 of 9
Showing 20 items per page