Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2008:0569-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0569.html Issue date: 2008-07-02 CVE Names: CVE-2008-2798 CVE-2008-2799 CVE-2008-2800 CVE-2008-2801 CVE-2008-2802 CVE-2008-2803 CVE-2008-2805 CVE-2008-2807 CVE-2008-2808 CVE-2008-2809 CVE-2008-2810 CVE-2008-2811 ===================================================================== 1. Summary: Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Mozilla Firefox is an open source Web browser. Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed web content was displayed. A web page containing specially-crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808) A flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) All Mozilla Firefox users should upgrade to these updated packages, which contain backported patches that correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 452597 - CVE-2008-2798 Firefox malformed web content flaws 452598 - CVE-2008-2799 Firefox javascript arbitrary code execution 452599 - CVE-2008-2800 Firefox XSS attacks 452600 - CVE-2008-2802 Firefox arbitrary JavaScript code execution 452602 - CVE-2008-2803 Firefox javascript arbitrary code execution 452604 - CVE-2008-2805 Firefox arbitrary file disclosure 452605 - CVE-2008-2801 Firefox arbitrary signed JAR code execution 452709 - CVE-2008-2807 Firefox .properties memory leak 452710 - CVE-2008-2808 Firefox file location escaping flaw 452711 - CVE-2008-2809 Firefox self signed certificate flaw 452712 - CVE-2008-2810 Firefox arbitrary file disclosure 453007 - CVE-2008-2811 Firefox block reflow flaw 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.0-2.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/yelp-2.16.0-19.el5.src.rpm i386: devhelp-0.12-17.el5.i386.rpm devhelp-debuginfo-0.12-17.el5.i386.rpm firefox-3.0-2.el5.i386.rpm firefox-debuginfo-3.0-2.el5.i386.rpm xulrunner-1.9-1.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm yelp-2.16.0-19.el5.i386.rpm yelp-debuginfo-2.16.0-19.el5.i386.rpm x86_64: devhelp-0.12-17.el5.i386.rpm devhelp-0.12-17.el5.x86_64.rpm devhelp-debuginfo-0.12-17.el5.i386.rpm devhelp-debuginfo-0.12-17.el5.x86_64.rpm firefox-3.0-2.el5.i386.rpm firefox-3.0-2.el5.x86_64.rpm firefox-debuginfo-3.0-2.el5.i386.rpm firefox-debuginfo-3.0-2.el5.x86_64.rpm xulrunner-1.9-1.el5.i386.rpm xulrunner-1.9-1.el5.x86_64.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.x86_64.rpm yelp-2.16.0-19.el5.x86_64.rpm yelp-debuginfo-2.16.0-19.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm i386: devhelp-debuginfo-0.12-17.el5.i386.rpm devhelp-devel-0.12-17.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm xulrunner-devel-1.9-1.el5.i386.rpm xulrunner-devel-unstable-1.9-1.el5.i386.rpm x86_64: devhelp-debuginfo-0.12-17.el5.i386.rpm devhelp-debuginfo-0.12-17.el5.x86_64.rpm devhelp-devel-0.12-17.el5.i386.rpm devhelp-devel-0.12-17.el5.x86_64.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.x86_64.rpm xulrunner-devel-1.9-1.el5.i386.rpm xulrunner-devel-1.9-1.el5.x86_64.rpm xulrunner-devel-unstable-1.9-1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.0-2.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/yelp-2.16.0-19.el5.src.rpm i386: devhelp-0.12-17.el5.i386.rpm devhelp-debuginfo-0.12-17.el5.i386.rpm devhelp-devel-0.12-17.el5.i386.rpm firefox-3.0-2.el5.i386.rpm firefox-debuginfo-3.0-2.el5.i386.rpm xulrunner-1.9-1.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm xulrunner-devel-1.9-1.el5.i386.rpm xulrunner-devel-unstable-1.9-1.el5.i386.rpm yelp-2.16.0-19.el5.i386.rpm yelp-debuginfo-2.16.0-19.el5.i386.rpm ia64: devhelp-0.12-17.el5.ia64.rpm devhelp-debuginfo-0.12-17.el5.ia64.rpm devhelp-devel-0.12-17.el5.ia64.rpm firefox-3.0-2.el5.ia64.rpm firefox-debuginfo-3.0-2.el5.ia64.rpm xulrunner-1.9-1.el5.ia64.rpm xulrunner-debuginfo-1.9-1.el5.ia64.rpm xulrunner-devel-1.9-1.el5.ia64.rpm xulrunner-devel-unstable-1.9-1.el5.ia64.rpm yelp-2.16.0-19.el5.ia64.rpm yelp-debuginfo-2.16.0-19.el5.ia64.rpm ppc: devhelp-0.12-17.el5.ppc.rpm devhelp-debuginfo-0.12-17.el5.ppc.rpm devhelp-devel-0.12-17.el5.ppc.rpm firefox-3.0-2.el5.ppc.rpm firefox-debuginfo-3.0-2.el5.ppc.rpm xulrunner-1.9-1.el5.ppc.rpm xulrunner-1.9-1.el5.ppc64.rpm xulrunner-debuginfo-1.9-1.el5.ppc.rpm xulrunner-debuginfo-1.9-1.el5.ppc64.rpm xulrunner-devel-1.9-1.el5.ppc.rpm xulrunner-devel-1.9-1.el5.ppc64.rpm xulrunner-devel-unstable-1.9-1.el5.ppc.rpm yelp-2.16.0-19.el5.ppc.rpm yelp-debuginfo-2.16.0-19.el5.ppc.rpm s390x: devhelp-0.12-17.el5.s390.rpm devhelp-0.12-17.el5.s390x.rpm devhelp-debuginfo-0.12-17.el5.s390.rpm devhelp-debuginfo-0.12-17.el5.s390x.rpm devhelp-devel-0.12-17.el5.s390.rpm devhelp-devel-0.12-17.el5.s390x.rpm firefox-3.0-2.el5.s390.rpm firefox-3.0-2.el5.s390x.rpm firefox-debuginfo-3.0-2.el5.s390.rpm firefox-debuginfo-3.0-2.el5.s390x.rpm xulrunner-1.9-1.el5.s390.rpm xulrunner-1.9-1.el5.s390x.rpm xulrunner-debuginfo-1.9-1.el5.s390.rpm xulrunner-debuginfo-1.9-1.el5.s390x.rpm xulrunner-devel-1.9-1.el5.s390.rpm xulrunner-devel-1.9-1.el5.s390x.rpm xulrunner-devel-unstable-1.9-1.el5.s390x.rpm yelp-2.16.0-19.el5.s390x.rpm yelp-debuginfo-2.16.0-19.el5.s390x.rpm x86_64: devhelp-0.12-17.el5.i386.rpm devhelp-0.12-17.el5.x86_64.rpm devhelp-debuginfo-0.12-17.el5.i386.rpm devhelp-debuginfo-0.12-17.el5.x86_64.rpm devhelp-devel-0.12-17.el5.i386.rpm devhelp-devel-0.12-17.el5.x86_64.rpm firefox-3.0-2.el5.i386.rpm firefox-3.0-2.el5.x86_64.rpm firefox-debuginfo-3.0-2.el5.i386.rpm firefox-debuginfo-3.0-2.el5.x86_64.rpm xulrunner-1.9-1.el5.i386.rpm xulrunner-1.9-1.el5.x86_64.rpm xulrunner-debuginfo-1.9-1.el5.i386.rpm xulrunner-debuginfo-1.9-1.el5.x86_64.rpm xulrunner-devel-1.9-1.el5.i386.rpm xulrunner-devel-1.9-1.el5.x86_64.rpm xulrunner-devel-unstable-1.9-1.el5.x86_64.rpm yelp-2.16.0-19.el5.x86_64.rpm yelp-debuginfo-2.16.0-19.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIa3xEXlSAg2UNWIIRAvmeAJ9qR6psPhewrwgJlRf87R5No5fwOQCfR3HH 2FUWLwa/Lzisds3Yec8D8k8= =ZcPh -----END PGP SIGNATURE----- --
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Application Stack v1.3 security and enhancement update Advisory ID: RHSA-2008:0510-01 Product: Red Hat Application Stack Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0510.html Issue date: 2008-07-02 CVE Names: CVE-2008-2079 ===================================================================== 1. Summary: Red Hat Application Stack v1.3 is now available. This update fixes a security issue and adds several enhancements. This updated has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64 Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64 3. Description: The Red Hat Application Stack is an integrated open source application stack, and includes JBoss Enterprise Application Platform (EAP). Starting with this update, JBoss EAP is no longer provided via the Application Stack channels. Instead, all Application Stack customers are automatically entitled to the JBoss EAP channels. This ensures all users have immediate access to JBoss EAP packages when they are released, ensuring lesser wait for security and critical patches. As a result, you must MANUALLY subscribe to the appropriate JBoss EAP channel, as all further JBoss EAP updates will only go to that channel. This update also entitles all customers to the JBoss EAP 4.3.0 channels. Users receive support for JBoss EAP 4.3.0 if they choose to install it. Important: downgrading from JBoss EAP 4.3.0 to 4.2.0 is unsupported. MySQL was updated to version 5.0.50sp1a, fixing the following security issue: MySQL did not correctly check directories used as arguments for the DATA DIRECTORY and INDEX DIRECTORY directives. Using this flaw, an authenticated attacker could elevate their access privileges to tables created by other database users. Note: this attack does not work on existing tables. An attacker can only elevate their access to another user's tables as the tables are created. As well, the names of these created tables need to be predicted correctly for this attack to succeed. (CVE-2008-2079) The following packages are updated: * httpd to 2.0.63 * mod_jk to 1.2.26 * the MySQL Connector/ODBC to 3.51.24r1071 * perl-DBD-MySQL to 4.006 * perl-DBI to 1.604 * postgresqlclient7 to 7.4.19 * postgresql-jdbc to 8.1.412 * unixODBC to 2.2.12 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 445222 - CVE-2008-2079 mysql: privilege escalation via DATA/INDEX DIRECTORY directives 6. Package List: Red Hat Application Stack v1 for Enterprise Linux AS (v.4): Source: ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/httpd-2.0.63-2.el4s1.2.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/mod_jk-1.2.26-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/mysql-5.0.50sp1a-2.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/mysql-connector-odbc-3.51.24r1071-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/perl-DBD-MySQL-4.006-1.el4.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/perl-DBI-1.604-1.el4s1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/php-5.1.6-3.el4s1.9.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/postgresql-jdbc-8.1.412-1jpp.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/postgresqlclient7-7.4.19-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/unixODBC-2.2.12-6.el4s1.1.src.rpm i386: httpd-2.0.63-2.el4s1.2.i386.rpm httpd-debuginfo-2.0.63-2.el4s1.2.i386.rpm httpd-devel-2.0.63-2.el4s1.2.i386.rpm httpd-manual-2.0.63-2.el4s1.2.i386.rpm mod_jk-ap20-1.2.26-1.el4s1.1.i386.rpm mod_jk-debuginfo-1.2.26-1.el4s1.1.i386.rpm mod_jk-manual-1.2.26-1.el4s1.1.i386.rpm mod_ssl-2.0.63-2.el4s1.2.i386.rpm mysql-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-bench-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-cluster-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-connector-odbc-3.51.24r1071-1.el4s1.1.i386.rpm mysql-connector-odbc-debuginfo-3.51.24r1071-1.el4s1.1.i386.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-devel-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-server-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-test-5.0.50sp1a-2.el4s1.1.i386.rpm perl-DBD-MySQL-4.006-1.el4.i386.rpm perl-DBD-MySQL-debuginfo-4.006-1.el4.i386.rpm perl-DBI-1.604-1.el4s1.i386.rpm perl-DBI-debuginfo-1.604-1.el4s1.i386.rpm php-5.1.6-3.el4s1.9.i386.rpm php-bcmath-5.1.6-3.el4s1.9.i386.rpm php-cli-5.1.6-3.el4s1.9.i386.rpm php-common-5.1.6-3.el4s1.9.i386.rpm php-dba-5.1.6-3.el4s1.9.i386.rpm php-debuginfo-5.1.6-3.el4s1.9.i386.rpm php-devel-5.1.6-3.el4s1.9.i386.rpm php-gd-5.1.6-3.el4s1.9.i386.rpm php-imap-5.1.6-3.el4s1.9.i386.rpm php-ldap-5.1.6-3.el4s1.9.i386.rpm php-mbstring-5.1.6-3.el4s1.9.i386.rpm php-mysql-5.1.6-3.el4s1.9.i386.rpm php-ncurses-5.1.6-3.el4s1.9.i386.rpm php-odbc-5.1.6-3.el4s1.9.i386.rpm php-pdo-5.1.6-3.el4s1.9.i386.rpm php-pgsql-5.1.6-3.el4s1.9.i386.rpm php-snmp-5.1.6-3.el4s1.9.i386.rpm php-soap-5.1.6-3.el4s1.9.i386.rpm php-xml-5.1.6-3.el4s1.9.i386.rpm php-xmlrpc-5.1.6-3.el4s1.9.i386.rpm postgresql-jdbc-8.1.412-1jpp.el4s1.1.i386.rpm postgresql-jdbc-debuginfo-8.1.412-1jpp.el4s1.1.i386.rpm postgresqlclient7-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.i386.rpm unixODBC-2.2.12-6.el4s1.1.i386.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.i386.rpm unixODBC-devel-2.2.12-6.el4s1.1.i386.rpm unixODBC-kde-2.2.12-6.el4s1.1.i386.rpm x86_64: httpd-2.0.63-2.el4s1.2.x86_64.rpm httpd-debuginfo-2.0.63-2.el4s1.2.x86_64.rpm httpd-devel-2.0.63-2.el4s1.2.x86_64.rpm httpd-manual-2.0.63-2.el4s1.2.x86_64.rpm mod_jk-ap20-1.2.26-1.el4s1.1.x86_64.rpm mod_jk-debuginfo-1.2.26-1.el4s1.1.x86_64.rpm mod_jk-manual-1.2.26-1.el4s1.1.x86_64.rpm mod_ssl-2.0.63-2.el4s1.2.x86_64.rpm mysql-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-bench-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-cluster-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-connector-odbc-3.51.24r1071-1.el4s1.1.x86_64.rpm mysql-connector-odbc-debuginfo-3.51.24r1071-1.el4s1.1.x86_64.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-devel-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-server-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-test-5.0.50sp1a-2.el4s1.1.x86_64.rpm perl-DBD-MySQL-4.006-1.el4.x86_64.rpm perl-DBD-MySQL-debuginfo-4.006-1.el4.x86_64.rpm perl-DBI-1.604-1.el4s1.x86_64.rpm perl-DBI-debuginfo-1.604-1.el4s1.x86_64.rpm php-5.1.6-3.el4s1.9.x86_64.rpm php-bcmath-5.1.6-3.el4s1.9.x86_64.rpm php-cli-5.1.6-3.el4s1.9.x86_64.rpm php-common-5.1.6-3.el4s1.9.x86_64.rpm php-dba-5.1.6-3.el4s1.9.x86_64.rpm php-debuginfo-5.1.6-3.el4s1.9.x86_64.rpm php-devel-5.1.6-3.el4s1.9.x86_64.rpm php-gd-5.1.6-3.el4s1.9.x86_64.rpm php-imap-5.1.6-3.el4s1.9.x86_64.rpm php-ldap-5.1.6-3.el4s1.9.x86_64.rpm php-mbstring-5.1.6-3.el4s1.9.x86_64.rpm php-mysql-5.1.6-3.el4s1.9.x86_64.rpm php-ncurses-5.1.6-3.el4s1.9.x86_64.rpm php-odbc-5.1.6-3.el4s1.9.x86_64.rpm php-pdo-5.1.6-3.el4s1.9.x86_64.rpm php-pgsql-5.1.6-3.el4s1.9.x86_64.rpm php-snmp-5.1.6-3.el4s1.9.x86_64.rpm php-soap-5.1.6-3.el4s1.9.x86_64.rpm php-xml-5.1.6-3.el4s1.9.x86_64.rpm php-xmlrpc-5.1.6-3.el4s1.9.x86_64.rpm postgresql-jdbc-8.1.412-1jpp.el4s1.1.x86_64.rpm postgresql-jdbc-debuginfo-8.1.412-1jpp.el4s1.1.x86_64.rpm postgresqlclient7-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-7.4.19-1.el4s1.1.x86_64.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.x86_64.rpm unixODBC-2.2.12-6.el4s1.1.i386.rpm unixODBC-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.i386.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-devel-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-kde-2.2.12-6.el4s1.1.i386.rpm unixODBC-kde-2.2.12-6.el4s1.1.x86_64.rpm Red Hat Application Stack v1 for Enterprise Linux ES (v.4): Source: ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/httpd-2.0.63-2.el4s1.2.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/mod_jk-1.2.26-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/mysql-5.0.50sp1a-2.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/mysql-connector-odbc-3.51.24r1071-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/perl-DBD-MySQL-4.006-1.el4.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/perl-DBI-1.604-1.el4s1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/php-5.1.6-3.el4s1.9.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/postgresql-jdbc-8.1.412-1jpp.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/postgresqlclient7-7.4.19-1.el4s1.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/unixODBC-2.2.12-6.el4s1.1.src.rpm i386: httpd-2.0.63-2.el4s1.2.i386.rpm httpd-debuginfo-2.0.63-2.el4s1.2.i386.rpm httpd-devel-2.0.63-2.el4s1.2.i386.rpm httpd-manual-2.0.63-2.el4s1.2.i386.rpm mod_jk-ap20-1.2.26-1.el4s1.1.i386.rpm mod_jk-debuginfo-1.2.26-1.el4s1.1.i386.rpm mod_jk-manual-1.2.26-1.el4s1.1.i386.rpm mod_ssl-2.0.63-2.el4s1.2.i386.rpm mysql-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-bench-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-cluster-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-connector-odbc-3.51.24r1071-1.el4s1.1.i386.rpm mysql-connector-odbc-debuginfo-3.51.24r1071-1.el4s1.1.i386.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-devel-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-server-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-test-5.0.50sp1a-2.el4s1.1.i386.rpm perl-DBD-MySQL-4.006-1.el4.i386.rpm perl-DBD-MySQL-debuginfo-4.006-1.el4.i386.rpm perl-DBI-1.604-1.el4s1.i386.rpm perl-DBI-debuginfo-1.604-1.el4s1.i386.rpm php-5.1.6-3.el4s1.9.i386.rpm php-bcmath-5.1.6-3.el4s1.9.i386.rpm php-cli-5.1.6-3.el4s1.9.i386.rpm php-common-5.1.6-3.el4s1.9.i386.rpm php-dba-5.1.6-3.el4s1.9.i386.rpm php-debuginfo-5.1.6-3.el4s1.9.i386.rpm php-devel-5.1.6-3.el4s1.9.i386.rpm php-gd-5.1.6-3.el4s1.9.i386.rpm php-imap-5.1.6-3.el4s1.9.i386.rpm php-ldap-5.1.6-3.el4s1.9.i386.rpm php-mbstring-5.1.6-3.el4s1.9.i386.rpm php-mysql-5.1.6-3.el4s1.9.i386.rpm php-ncurses-5.1.6-3.el4s1.9.i386.rpm php-odbc-5.1.6-3.el4s1.9.i386.rpm php-pdo-5.1.6-3.el4s1.9.i386.rpm php-pgsql-5.1.6-3.el4s1.9.i386.rpm php-snmp-5.1.6-3.el4s1.9.i386.rpm php-soap-5.1.6-3.el4s1.9.i386.rpm php-xml-5.1.6-3.el4s1.9.i386.rpm php-xmlrpc-5.1.6-3.el4s1.9.i386.rpm postgresql-jdbc-8.1.412-1jpp.el4s1.1.i386.rpm postgresql-jdbc-debuginfo-8.1.412-1jpp.el4s1.1.i386.rpm postgresqlclient7-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.i386.rpm unixODBC-2.2.12-6.el4s1.1.i386.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.i386.rpm unixODBC-devel-2.2.12-6.el4s1.1.i386.rpm unixODBC-kde-2.2.12-6.el4s1.1.i386.rpm x86_64: httpd-2.0.63-2.el4s1.2.x86_64.rpm httpd-debuginfo-2.0.63-2.el4s1.2.x86_64.rpm httpd-devel-2.0.63-2.el4s1.2.x86_64.rpm httpd-manual-2.0.63-2.el4s1.2.x86_64.rpm mod_jk-ap20-1.2.26-1.el4s1.1.x86_64.rpm mod_jk-debuginfo-1.2.26-1.el4s1.1.x86_64.rpm mod_jk-manual-1.2.26-1.el4s1.1.x86_64.rpm mod_ssl-2.0.63-2.el4s1.2.x86_64.rpm mysql-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-bench-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-cluster-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-connector-odbc-3.51.24r1071-1.el4s1.1.x86_64.rpm mysql-connector-odbc-debuginfo-3.51.24r1071-1.el4s1.1.x86_64.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-debuginfo-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-devel-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.i386.rpm mysql-libs-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-server-5.0.50sp1a-2.el4s1.1.x86_64.rpm mysql-test-5.0.50sp1a-2.el4s1.1.x86_64.rpm perl-DBD-MySQL-4.006-1.el4.x86_64.rpm perl-DBD-MySQL-debuginfo-4.006-1.el4.x86_64.rpm perl-DBI-1.604-1.el4s1.x86_64.rpm perl-DBI-debuginfo-1.604-1.el4s1.x86_64.rpm php-5.1.6-3.el4s1.9.x86_64.rpm php-bcmath-5.1.6-3.el4s1.9.x86_64.rpm php-cli-5.1.6-3.el4s1.9.x86_64.rpm php-common-5.1.6-3.el4s1.9.x86_64.rpm php-dba-5.1.6-3.el4s1.9.x86_64.rpm php-debuginfo-5.1.6-3.el4s1.9.x86_64.rpm php-devel-5.1.6-3.el4s1.9.x86_64.rpm php-gd-5.1.6-3.el4s1.9.x86_64.rpm php-imap-5.1.6-3.el4s1.9.x86_64.rpm php-ldap-5.1.6-3.el4s1.9.x86_64.rpm php-mbstring-5.1.6-3.el4s1.9.x86_64.rpm php-mysql-5.1.6-3.el4s1.9.x86_64.rpm php-ncurses-5.1.6-3.el4s1.9.x86_64.rpm php-odbc-5.1.6-3.el4s1.9.x86_64.rpm php-pdo-5.1.6-3.el4s1.9.x86_64.rpm php-pgsql-5.1.6-3.el4s1.9.x86_64.rpm php-snmp-5.1.6-3.el4s1.9.x86_64.rpm php-soap-5.1.6-3.el4s1.9.x86_64.rpm php-xml-5.1.6-3.el4s1.9.x86_64.rpm php-xmlrpc-5.1.6-3.el4s1.9.x86_64.rpm postgresql-jdbc-8.1.412-1jpp.el4s1.1.x86_64.rpm postgresql-jdbc-debuginfo-8.1.412-1jpp.el4s1.1.x86_64.rpm postgresqlclient7-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-7.4.19-1.el4s1.1.x86_64.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.i386.rpm postgresqlclient7-debuginfo-7.4.19-1.el4s1.1.x86_64.rpm unixODBC-2.2.12-6.el4s1.1.i386.rpm unixODBC-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.i386.rpm unixODBC-debuginfo-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-devel-2.2.12-6.el4s1.1.x86_64.rpm unixODBC-kde-2.2.12-6.el4s1.1.i386.rpm unixODBC-kde-2.2.12-6.el4s1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079 http://www.redhat.com/docs/en-US/Red_Hat_Application_Stack/1.3/html-single/Release_Notes/ http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIa31UXlSAg2UNWIIRAnL8AKCeWKFjok+M3zZm7UAKoupYDhO8XACfYcpJ HqKUkij9JOKvBqXxn6lkMMc= =KGG4 -----END PGP SIGNATURE----- --
  3. iTunes Controller Playwatch Updated To Version 1.2 - Published on 07/02/08 AQUARIUS software has announced the immediate availability of Playwatch 1.2, a popular iTunes controller and information ticker for the menu bar on the Mac. This update delivers exciting new features. For example, iTunes remote control buttons can now be placed directly in the menu bar next to the ticker. In addition, Playwatch 1.2 offers new Cover-Art and track views and a number of bug fixes. Cologne, Germany - AQUARIUS software has announced the immediate availability of Playwatch 1.2, a popular iTunes controller and information ticker for the menu bar on the Mac. This update delivers exciting new features. For example, iTunes remote control buttons can now be placed directly in the menu bar next to the ticker. In addition, Playwatch 1.2 offers new Cover-Art and track views and a number of bug fixes. About Playwatch: Playwatch is a very unobtrusive, yet powerful menu bar controller for iTunes. It sits on the menu bar, providing title, artist, album and other information as a ticker with smooth scrolling and transition effects. Album Cover-Art and lyrics are displayed on demand. Two new Cover-Art views now display the tracks belonging to the album. With just one click, a track can be selected and played in iTunes. Change of Cover-Art is provided with unique transition effects that are a pleasure to watch. Cover-Art can be placed anywhere on the desktop even on different screens. System Requirements: * Mac OS X 10.5 (10.5.2 or higher recommended) * PowerPC G4, G5 or Intel Processor * iTunes 7.4 or higher Pricing and Availability: Playwatch 1.2 is a free upgrade to registered users and is compatible with Mac OS X Leopard (10.5). New Users may purchase the software for $13,20 directly from the AQUARIUS software website. New users can also download a free, fully functional 30-day demo from the website. AQUARIUS software: http://www.aquarius-software.de Playwatch: http://www.aquarius-software.de/AQUARIUS-software_en/Playwatch.html Direct Download Link: http://www.aquarius-software.de/AQUARIUS-software_en/PlaywatchDownload_files/Playwatch_1.2.0.dmg.zip Purchase Link: https://secure.shareit.com/shareit/checkout.html?PRODUCT%5B300221745%5D=1&hidecoupon=1&DELIVERY%5B300221745%5D=EML&stylefrom=300221745&backlink=http://www.aquarius-software.de Screenshot: http://www.aquarius-software.de/AQUARIUS-software/PlaywatchScreenshots/Playwatch_1.2.0Shot.jpg AQUARIUS software is a developer and publisher of Macintosh software designed to make daily work more fun and more productive. For more Information and to keep informed about new product introductions and releases please visit the company's website. © 2008 AQUARIUS software, Cologne - Germany. ### Joachim Deelen CEO +49 221 9526026 jdeelen ( -at -) aquarius-software.de *******
  4. Hello, Intel Core 2 Extreme CPU Cooler Review "Intel Core 2 Extreme CPU got a special treatment from the Intel thermal management department; a fancy large CPU cooler with 110cm LED fan and copper heat column. How does it compare to the other Intel reference coolers? Is it an alternative for 3rd party heatsinks, let us find out!" http://www.madshrimps.be/gotoartik.php?articID=829 ____________________________________ Thank you in advance for posting,
  5. news

    SOYO 24\

    Today we look at the SOYO 24' Pearl Series LCD Monitor. SNIP: To help you with your buying decision we at Bjorn3D will be looking at one of the largest monitors offered by a company well known for making great monitors at a great price, SOYO. With us today is their 24' Pearl Series LCD monitor that brings with it plenty of quality specs on paper. Is it the right monitor for your next upgrade? How much will it cost you? And most importantly, are you getting your money's worth? Read on to find out just how well this monitor performs in our testing labs. http://www.bjorn3d.com/read.php?cID=1299 A post on your site would be great if you can. Thank you, Scott -----------------------------------------
  6. Hello, - Halo Wars Screens #5 http://www.gamershell.com/news_54160.html - Ironclads: American Civil War New Screens http://www.gamershell.com/news_54158.html - Soul Calibur IV Pre-Order Deals http://www.gamershell.com/news_54154.html Best Regards, GamersHell.com Staff =============================================================================
  7. Hello, - TrackMania Nations Forever World Record Trailer http://www.gamershell.com/news_54152.html - Combat Arms Open Beta Begins and Client http://www.gamershell.com/news_54150.html - Project Torque Updated Client Released http://www.gamershell.com/news_54148.html Best Regards, GamersHell.com Staff =============================================================================
  8. Hello Again, Futurelooks channels that inner Spielberg with a review of an HD Camcorder... Samsung SC-HMX20C High Definition Digital Camcorder Review Earlier this spring, we reviewed Samsung’s SC-HMX10A, an HD camcorder that gave us a 1080i resolution, touch screen controls and photo functionality, all in a package not much bigger than a Coke Can. Although we were fairly impressed with the HD quality of the playback, especially via the built in HDMI port, we found the camera function to be a fairly useless feature that ended up being a “miss the moment” rather than “capture the moment” feature. Has Samsung succeeded in improving on their previous work with the introduction of the Samsung SC-HMX20C? Let’s find out! Direct Link: http://www.thetechzone.com/sendstudio/link.php?M=635&N=212&L=84 A post to your news would be most appreciated! Regards, -The Futurelooks Team- www.futurelooks.com
  9. Hello Friends, Editors and Newsposter, we just posted a new Review. Title: Dell Vostro 1500 Review Link: http://spicygadget.com/2008/06/24/dell-vostro-1500-review/ Quote: "So I purchased the Dell Vostro 1500 laptop, the newest edition in Dell’s lineup of business laptops since I own an older Inspiron laptop model and it never failed me. I looked around for all different brands before choosing Dell again just to see if I could do better with the same or even $200 dollars more on the price, but I just can’t find anything cheaper with such a great host of features and excellent specs." Thank you for posts, Phi Nguyen If you have any news you'd like to share, send them to spicygadget ( -at -) gmail.com
  10. Hi Editors, Tech-Reviews.co.uk has just posted a news review online. A link or inclusion of the review in a news post would be much appreciated. Title: Nexus HOC-9000 ( -at -) Tech-Reviews.co.uk Briefing: CPU cooling has become a dominant sector of computer components recently as the need for a cooler that not only performs well but also has low noise levels has become a fundamental rule of most higher-end computer systems. With many putting their processors under a lot of strain through overclocking and gaming, central processing units tend to heat up rapidly; in response to this Nexus have crafted the HOC-9000 - a supposedly 'real-silent' CPU cooler. Link: http://tech-reviews.co.uk/reviews/nexus-hoc-9000/ Image SRC: http://tech-reviews.co.uk/images/thumbs/nexushoc.jpg Please continue to send us news at the provided address:
  11. Hi, We've just posted a new article on our website, Hardware Secrets. Title: DirectX Versions Link: http://www.hardwaresecrets.com/article/95 Category: Tutorials Summary: What are the main differences between the several DirectX versions released? Find out in this tutorial. Here is a snippet: "DirectX is a programming interface that allows programs (like games) to talk with your PC hardware (like your video card). There are several DirectX versions available and in this short tutorial we will explain what the main differences between them are." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  12. Hello Technology News Community, I4U NEWS published a review of the Maximo iMetal iP-HS2 Isolation Headset for iPhone. Quote from the review: "Today we are looking at the iMetal iP-HS2 Isolation Headset for iPhone that is designed to work specifically with the iPhone. The headset is very attractive and works well. The other day we reviewed teh iP-HS1 model from the same company. I found that the ear tips are rather small in their sizes; I typically use medium ear tips on most isolation style headsets. On the iMetal iP-HS2 Isolation Headset for iPhone, I had to move up to the large to get the same seal and fit I normally see with medium tips. If you have large ears, this could be an issue for you." Full Review: http://www.i4u.com/full-review-449.html Photo: http://www.i4u.com/images/2007/maximoiphs-stock.jpg Homepage Link: http://www.i4u.com We would very much appreciate if you post this news story/review on your site. As always I4U News is open to cross-post your technology stories. Please visit http://www.i4u.com for more stories. As long as you provide credits and links to the original story on I4U News we appreciate any cross-posting of our content. If you don't want to receive review and news submissions from I4U News please just reply to this email indicating that or use the unsubscribe link below. We appreciate giving us a chance to inform you about our latest reviews and please apologize if this email reaches you in error or does not meet your interest. best regards, Chief Editor Luigi Lugmayr :: I4U Technology News Network :: http://www.i4u.com - Technology News http://shop.i4u.com - I4U Shop http://pricewatch.i4u.com - Shopping Guide http://www.wristdreams.com - Technology Wrist Watches :::
  13. A news post would be great. OCC has published a new article on the Gigabyte International Overclocking Tournament Here is a quote from the article: Quote: "Once the setup was done, the warming up and benchmarking began. Each contestant was given a time limit to submit scores and the highest score submitted is the score that was counted. I was amazed on how quick these guy got their hardware soaring. One contestant, Chris, had his CPU to 5.8GHz before the power circuit for his side of the tables tripped, cutting all power. The result was their hardware freezing over and damaging the motherboards and possibly the CPUs. They changed out boards and the next time he was only able to pull out 5.57GHz" Title: Gigabyte International Overclocking Tournament Link: http://www.overclockersclub.com/reviews/gigabyte_competition/ Img: http://www.overclockersclub.com/siteimages/articles/gigabyte_competition/ln2_thumb.jpg
  14. Hello, OCIA.net has posted their review of the OtterBox iPhone Armor Case with Waterproof Headphones. Below is a direct quote from the review: "OtterBox has been around since 1996, catering to the "klutzy, spontaneous, chaotic, graceless individuals who have broken a device or valuable due to their active lifestyle". Whether you are into hiking, biking, camping, skiing, swimming or any other outdoor activity, OtterBox likely has a product that will allow you to safely bring your electronic gadgets along for the ride. Today I will be taking a look at the OtterBox Armor Case for the iPhone, the more rugged alternative to the Defender Case that we reviewed earlier this year. Unlike the Defender series, the Armor series is fully waterproof up to 3 feet, and OtterBox even included a set of Waterproof Headphones for us to try out." Direct Link: http://www.ocia.net/reviews/iphonearmor/page1.shtml Image Link: http://www.ocia.net/images/icons/315.jpg Site Link: http://www.ocia.net A news posting on your site would be greatly appreciated. Thanks in advance for your support! Thanks, OCIA.net Staff http://www.ocia.net
  15. Hello Webmasters and News Posters, NEW CONTENT (Guides) - How To Replace Memory Heat Spreaders QUOTE: "Welcome to another session of void-your-warranty, as today we will look at upgrading the stock heat spreaders on a pair of Kingston DDR2 memory modules. What we will do here is run through a step-by-step of removing the plain flat aluminum spreaders that come with most RAM modules and upgrading them with some Nexus HXR-550B Heat-Pipe memory coolers." For more information, please visit - http://www.tweaktown.com/guides/1491/how_to_replace_memory_heat_spreaders/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
  16. Hello, - Help from Hell - 1 July 2008 - Metal Gear Solid 4: Guns of the Patriots: FAQ/Walkthrough http://www.gamershell.com/news_54146.html - DT Carnage Announced and Screens http://www.gamershell.com/news_54144.html - Dead Space Sweepstakes and Video Dev Diary #4 http://www.gamershell.com/news_54142.html - Spider-Man: Web of Shadows Package Design Voting Underway http://www.gamershell.com/news_54140.html - RuneScape High Detail Released http://www.gamershell.com/news_54138.html - Big Bang Mini New Screens http://www.gamershell.com/news_54136.html - Rappelz: Epic V: Dragonic Age Release Date Confirmed http://www.gamershell.com/news_54134.html - CustomPlay Golf 2009 Announced and Screens http://www.gamershell.com/news_54130.html Best Regards, GamersHell.com Staff =============================================================================
  17. Hardware Canucks is pleased to present our eagerly-anticipated review of the Sapphire Radeon HD4850 512MB graphics card. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/8299-sapphire-radeon-hd4850-512mb-graphics-card-review.html *Quote:* *The HD4850 is a product which is aimed straight for the throat of Nvidia's 9800GTX and has actually incited a quick and dramatic response from the boys in green. After the initial performance reports of this card were released, Nvidia quickly knocked nearly $100 off the MSRP of their then $300 GTX so it could compete mono a mono with ATI's new wunderkind. Not only is the HD4850 seemingly perfectly suited for budget-minded gamers in the $200 price bracket, but it also offers a bevy of other features including audio out through HDMI as well as Havok physics support. The more features the better we say.* *Image URL:* http://images.hardwarecanucks.com/image/skymtl/GPU/SAPPHIRE-HD4850/SAPPHIRE-9.jpg We would apprecate it if you posted this on your News page. Regards, Hardware Canucks News Team
  18. Dear Friends, Yesterday we released AMD Chipset Roadmap for 2009, today we have the efatures of the new Southbridge that will go with the new chipsets. It has several improvements line: A-link Express 3.0 ( -at -) 4x5GHz PCI Express GPP - PCI-Express 2.0 ( -at -) 4x5GHz Support for AMD Fusion Ethernet MAC Gb integrada Integrated Clock (Optional) SATA AHCI 1.2 SATA III Opcional - Up to 6Gbps (optional) Please feel free to post this in your news section, attached you will fin the image with all the features. Here is the source in our news section: http://www.chw.net/foro/novedades-amd-sb-800-a-t166214.html Regards Metro
  19. Compu-KISS has published an article entitled "Phishing Sechemes Lead to Identity Theft" Here's a clip from the article: Quote: Internet scams to steal personal information and perpetrate identity theft are at an all time high. Phishing is the scam that most often lures unsuspecting victims into the net. Title: Phishing Sechemes Lead to Identity Theft Article: http://www.compukiss.com/phishing-schemes-lead-to-identity-theft.html Picture: http://www.compukiss.com/images/stories/security/fishhook.jpg A news post on your website would be greatly appreciated!
  20. Hello, - Crysis Warhead Screens http://www.gamershell.com/news_54132.html - Gamecock Joins Steam http://www.gamershell.com/news_54128.html - Quantum of Solace Screens http://www.gamershell.com/news_54126.html Best Regards, GamersHell.com Staff =============================================================================
  21. Hello, - Beijing 2008 - The Official Video Game of the Olympic Games Screens #7 http://www.gamershell.com/news_54122.html - Sid Meier's Civilization Revolution Trailer #3 http://www.gamershell.com/news_54124.html - NavyField New Server Launching This July http://www.gamershell.com/news_54120.html - Shadow of Legend Guild Support Announced http://www.gamershell.com/news_54116.html - FIFA 09 Announced and Screens http://www.gamershell.com/news_54118.html - NARUTO: Clash of Ninja Revolution 2 and NARUTO: Path of the Ninja 2 at Anime Expo 2008 http://www.gamershell.com/news_54114.html - StoneLoops! Localized Versions Available http://www.gamershell.com/news_54112.html - New Game Coming to Xbox LIVE Arcade #14 http://www.gamershell.com/news_54110.html - Gurumin: A Monstrous Adventure Available on PLAYSTATION Store http://www.gamershell.com/news_54108.html - New Titles Coming to Wii Shop Channel #70 http://www.gamershell.com/news_54104.html Best Regards, GamersHell.com Staff =============================================================================
  22. Hello, - The Mummy: Tomb of the Dragon Emperor Screens #4 http://www.gamershell.com/news_54106.html - Oxygen Games 2008 Line Up Unveiled http://www.gamershell.com/news_54102.html - DS3 Shocking Europe This Week http://www.gamershell.com/news_54100.html - Aeronauts Announced and Trailer/Game Client http://www.gamershell.com/news_54098.html - Mushroom Men Screens #4 http://www.gamershell.com/news_54096.html - Street Gears New Details and Artwork http://www.gamershell.com/news_54092.html - Garage Games Demo Pack #3 http://www.gamershell.com/news_54094.html Best Regards, GamersHell.com Staff =============================================================================
  23. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] xorg-server (SSA:2008-183-01) New xorg-server packages are available for Slackware 12.1 and -current to fix security issues in xorg-server 1.4 prior to version 1.4.2. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362 Here are the details from the Slackware 12.1 ChangeLog: +--------------------------+ patches/packages/xorg-server-1.4.2-i486-1_slack12.1.tgz: Upgraded xorg-server to address denial of service and possible arbitrary code execution flaws reported in xorg-server 1.4 prior to 1.4.2. For more information about the issues patched, please refer to: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362 (* Security fix *) patches/packages/xorg-server-xnest-1.4.2-i486-1_slack12.1.tgz: Security fixes (see CVE entries above). (* Security fix *) patches/packages/xorg-server-xvfb-1.4.2-i486-1_slack12.1.tgz: Security fixes (see CVE entries above). (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com. Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 12.1: ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/xorg-server-1.4.2-i486-1_slack12.1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/xorg-server-xnest-1.4.2-i486-1_slack12.1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/xorg-server-xvfb-1.4.2-i486-1_slack12.1.tgz Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-1.4.2-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xnest-1.4.2-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/xorg-server-xvfb-1.4.2-i486-1.tgz MD5 signatures: +-------------+ Slackware 12.1 packages: 4f53f4f232f614f43ff8455602bb3391 xorg-server-1.4.2-i486-1_slack12.1.tgz 7a9b6e3801c08d6d1839b68dd9715e9e xorg-server-xnest-1.4.2-i486-1_slack12.1.tgz 1a1b00c1867d81369d167933229e9284 xorg-server-xvfb-1.4.2-i486-1_slack12.1.tgz Slackware -current packages: a8e1298855bbf08217343a7aa8776b0f xorg-server-1.4.2-i486-1.tgz 64491ebde2bf1f15240c36921aa965ba xorg-server-xnest-1.4.2-i486-1.tgz e2eec7d598adee8e2bf4359868b2670f xorg-server-xvfb-1.4.2-i486-1.tgz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg xorg-server-1.4.2-i486-1_slack12.1.tgz xorg-server-xnest-1.4.2-i486-1_slack12.1.tgz xorg-server-xvfb-1.4.2-i486-1_slack12.1.tgz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  24. Hi, We've just posted a new article on our website, Hardware Secrets. Title: All Phenom Models Link: http://www.hardwaresecrets.com/article/504 Category: Tutorials Summary: A quick reference table showing the main specs of all Phenom models released to date. Here is a snippet: "Phenom is the latest CPU series from AMD, based on their new K10 architecture. In this short tutorial we will list the main specs of all Phenom models released or announced so far." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  25. Appomattox _0.2.1_ has been released. This is a bugfix release so I could get it to work on the OpenSUSE build service. What is Appomattox? Appomattox is a GIS Client for the GNOME desktop. It works on windows too. Basically it is a spatial data viewer which currently supports ESRI shapefile and PostGIS data. source and packages are available here: http://www.salmonsalvo.net/Appomattox --Scott _______________________________________________
×