Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Title: Apevia Warlock 900 Watt Power Supply Review ( -at -) HardwareLogic Quote: "Apevia opened its doors in March of 1999 with the goal of providing “state-of-the-art technology at fair and affordable prices.” The company may best be known for its gamer targeted PC cases, but they also carry other products - including PSUs. Today we have an Apevia 900 watt Warlock PSU ready for the test bench. With its clear acrylic side panels and multi color LED 135mm fan, it's obvious the Apevia 900 watt Warlock is target at the modder and gamer markets. But, has it “Got Game?” Let's find out." Link: http://hardwarelogic.com/news/136/ARTICLE/3704/2008-05-27.html
  2. A news post would be great. OCC has published a new review on the Thermaltake VH6000BWS Armor+ Here is a quote from the review: Quote: "Temperatures were about average in the Thermaltake Armor+, with the exception of the video card - which was helped by the 230mm intake fan and the optional PCI card fan. The case has enough room for any system builder, and is certified for NVIDIA's Tri-SLI, so there will be no cramping here. The removable motherboard tray is great feature, and should be standard in all computer cases. If removed, the two hard drive cages at the bottom of the Armor+ leave enough room to install a two-fan liquid cooling radiator, so you are not stuck with the LCS if you choose to go with an aftermarket liquid cooling setup. The number of 5.25" bays lets you expand your hardware to your hearts' content, as long as your motherboard can handle it. The case is quite heavy, so you might not be toting it to LAN parties." Title: Thermaltake VH6000BWS Armor+ Review Link: http://www.overclockersclub.com/reviews/thermaltake_armor_plus/ Img: http://www.overclockersclub.com/siteimages/articles/thermaltake_armor_plus/4_thumb.jpg
  3. ZEROtherm ZEN FZ 120 CPU Cooler Review ( -at -) ThinkComputers.org Review URL: http://www.thinkcomputers.org/index.php?x=reviews <http://www.thinkcomputers.org/index.php?x=reviews&id=770> &id=770 Image URL (336 X 256): http://www.thinkcomputers.org/reviews/zerotherm_fz120/email.jpg Alt Image URL (194 X 150): http://www.thinkcomputers.org/reviews/zerotherm_fz120/thumbs/1.jpg Quote: "ZEROtherm has really made a name for themselves over the past year. The last 3 products we reviewed from them scored very high and all of them have received awards. But there are still people who have not heard of them. Well ZEROtherm has announced a new cooler, the ZEN FZ 120, which they were kind enough to send us. Will it perform up to what we have grown to expect from ZEROtherm? Read on to find out..."
  4. Greetings, Overclockers Online has posted a new review. A news post would be greatly appreciated. Title: Biostar TPower N750 at Overclockers Online Link: http://www.overclockersonline.net/?page=articles&num=1762 Quote: The T-Power N750 comes loaded with features and accessories. BIOS options leave nothing to be desired by even the most adventurous overclocker, giving a solid platform for AMD fans. I love the package of accessories and software included and NVIDIA finally brings PCI Express 2.0 support to SLI configs for AMD CPUs. While onboard video is less than stellar, adding a high end video card will allow for some energy savings. Thanks for the post. Best regards, Jared _______________________________________________
  5. Hello, - NavyField New Patch Released and v1.24 Client http://www.gamershell.com/news_51478.html - Space Chimps New Trailers http://www.gamershell.com/news_51476.html - The Incredible Hulk TV Spot http://www.gamershell.com/news_51474.html - MMOABC and Bigpoint Sign Deal http://www.gamershell.com/news_51472.html - Champions Online Ankylosaur and Concept Art #4 http://www.gamershell.com/news_51470.html - SplashFighters NA Open Beta Testing Started and Client http://www.gamershell.com/news_51468.html - Venetica Announced and Screens/Trailer http://www.gamershell.com/news_51466.html Best Regards, GamersHell.com Staff =============================================================================
  6. Hi, We've just posted a new article on our website, Hardware Secrets. Title: HiVi Swans S3W Speakers Review Link: http://www.hardwaresecrets.com/article/560 Category: Reviews Summary: We reviewed the simplest audiophile-quality speaker set from HiVi, Swans S3W. Here is a snippet: "HiVi is a manufacturer of audiophile-grade speakers. Swans S3W is their simplest model, targeted to users that want a simple yet stylish stereo speaker set for their computers, iPods or portable CD players but at the same time want an above-the-average audio quality. Let's see how this speaker set performs." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  7. The migration to Mediawiki is finally complete! The technical side, that is. Now is the part where we all learn how to migrate our knowledge and clean-up content. http://fedoraproject.org/wiki/ There are many things you need to keep in mind while exploring and learning this new environment. Yes, the markup language is a little different, but there are also new conventions to learn. As you proceed, use this page to guide you: https://fedoraproject.org/wiki/FedoraProject:Wiki_migration_to-do Put a watch on that page, that is your best resource for initial problem resolution. It's important to know that some formatting and perhaps some content has not cleanly migrated. If you come across an error, edit and fix the problems you see. With our many eyes and hands we make this transition as painless as possible. For initial support, how-to help, and so forth, visit #fedora-docs on irc.freenode.net. Technical issues are escalated to #fedora-admin. Refer to [[FedoraProject:Wiki_migration_to-do]] for more on this. Keep the following in mind: * Log in with your FAS username. We no longer use WikiName. If you don't have a FAS username, obtain one at https://admin.fedoraproject.org/accounts/. * MANUALLY move your old home page to the new location of /wiki/User:username. For example, I moved /wiki/MikeMcGrath to /wiki/User:Mmcgrath. Mediawiki handles the redirect properly so your old link continues to work. * Your list of watch pages are _NOT_ migrated over. This is because mediawiki does not support regular expressions. Instructions for migrating your watchlist are on the [[FedoraProject:Wiki_migration_to-do]] page. * Page restrictions - The ACL system is now controlled by the admin team. If you find an ACL you had put in place no longer works, please contact admin fedoraproject org or stop by #fedora-admin on irc.freenode.net * HTML is no longer allowed. Due to security concerns (that also existed in Moin) raw HTML is no longer allowed in page source. Read [[FedoraProject:Wiki_migration_to-do#Images_and_Attachments]] for more information. https://fedoraproject.org/wiki/FedoraProject:Wiki_migration_to-do#Images_and_Attachments * Attachments in MediaWiki are all stored in one location. They have been migrated. As an example, if the old attachment was at: ./Marketing/Flyer/ attachment:fc6_front.png The new location for it is: Marketing_Flyer_fc6_front.png * Browse all attachments and images at [[special:Uncategorizedimages]] https://fedoraproject.org/wiki/Special:Uncategorizedimages * The old wiki continues to be available in read-only mode at http://fedoraproject.org/wikiold/ for $unspecified_amount_of_time after the migration. The [[FedoraProject:Wiki_migration_to-do#Subproject_and_SIG_teams_to-do_list]] has tips on obtaining raw source content from that wiki if needed. https://fedoraproject.org/wiki/FedoraProject:Wiki_migration_to-do#Subproject_and_SIG_teams_to-do_list Following this migration, we'll begin discussing and rolling out procedures to take advantage of other MediaWiki features, such as categories and namespaces. Thanks for your support, Mike McGrath, on behalf of the wiki migration team --
  8. news

    GLib 2.17.0 released

    GLib 2.17.0 is now available for download at: http://download.gnome.org/sources/glib/2.17/ glib-2.17.0.tar.bz2 md5sum: 03da0783697df2db187c76d1534b3d93 glib-2.17.0.tar.gz md5sum: b86660c1b7fa481f6b21bfba2e3ba2eb This is the first development release leading up to GLib 2.18. Notes: * This is unstable development release. While it has had a bit of testing, there are certainly plenty of bugs remaining to be found. This release should not be used in production. * Installing this version will overwrite your existing copy of GLib 2.16. If you have problems, you'll need to reinstall GLib 2.16. * GLib 2.18 will be source and binary compatible with the GLib 2.16 series; however, the new API additions in GLib 2.17.0 are not yet finalized, so there may be incompatibilities between this release and the final 2.18 release. * Bugs should be reported to http://bugzilla.gnome.org. About GLib ========== GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system. More information about GLib is available at: http://www.gtk.org/ An installation guide for the GTK+ libraries, including GLib, can be found at: http://developer.gnome.org/doc/API/2.0/gtk/gtk-building.html Overview of Changes from GLib 2.16.x to GLib 2.17.0 =================================================== * Update to Unicode 5.1 * Update included libcharset to the one shipped with libiconv 0.12 * Update included PCRE to 7.7 * Enforce that only toplevel headers are directly included. This is turned on by default for GObject and GIO. To turn it on for GLib, define G_DISABLE_SINGLE_INCLUDES. * Fix library version of GIO. GLib 2.16 shipped with libgio-2.0.so.0.0.0 * On Solaris, use FEN for file monitoring in GIO * Use the GIO_EXTRA_MODULES environment variable to find additional GIO modules * G_GNUC_ALLOC_SIZE: New macro that wraps the gcc alloc_size function attribute * g_checksum_reset: New function to reset the state of a GChecksum * g_unix_mount_monitor_set_rate_limit: New function to limit the rate at which events are reported * g_file_query_file_type: New utility function to query the type of a file * g_memory_output_stream_get_data_size: New function to obtain the size of the written data. * Bugs fixed: 522292 Gives warnings in glib/gutils.h with GCC in C99 mode 523298 win_iconv can't convert from UTF-8 to GB18030 (or vice versa) 518160 replace two g_strdup_printf calls in GBookmarkFile 523877 gbookmarkfile: avoid using g_string_append_printf() and other optimizations 525192 100% CPU if run main loop with no IO sources 315437 extern inline -> static inline 524314 g_convert() on Win32 implicitly converts full width alphanumerics into half width 525732 Error in documentation for g_list_first 525674 A typo in gmarkup.c 448943 g_timeout_add_seconds() problems 525972 UCS-4 not in the new win_iconv implementation 526619 make test-report crash 491554 Update to Unicode 5.1.0 519137 g_slice_dup macro needs cast for 64-bit platform 528752 Win32 build and SSL not working 530457 G_USER_DIRECTORY_DOWNLOAD folder improperly mapped 528667 Typos in testing module documentation 459905 Bug in wcwidth data 534085 g_unichar_iswide_cjk() has a totally wrong table 501651 Update glib/libcharset 519026 G_STMT_START/G_STMT_END test a non-existent preprocessor symbol 534319 GLib's .pc files could use Libs.private 534137 Typo in g_spawn_async_with_pipes doc 517419 gio win32 directory monitor 526796 Wrong order of arguments in g_file_copy's fallback 530196 _g_local_file_has_trash_dir() doesn't handle st_dev == 0 532965 Should not return filesystem::free for certain file systems 525553 fix typo and nitpicking in GArray documentation 526572 Missing * in declaration of parent_class in Object Destruction section of GObject Reference Manual 528648 Extra >s in Object Construction section 535021 g_param_spec_internal documentation should describe purpose of nick and blurb 521513 Firefox crash when using file picker 528433 gdesktopappinfo snafu ... 533369 API g_file_info_get_attribute_string () unables to get "... 521045 glib f_fstypename miscellany 521672 compile error 521946 control rate limit on GUnixMountMonitor 522335 Fails to build: glib/gtester.c:276: error: 'ARG_MAX' unde... 523015 Implement sliding window based upload operation 523019 Use new GCC 4 feature 523338 list nfs4 as a nfs mount type 524350 Make glib build without NLS again 524579 g_file_copy reports wrong total on progress callback for ... 524742 A typo in gtestutils.c. 524950 Minor documentation typos. 525866 the user directory should not be considered as a mount to... 526320 should not list mounts that the user doesn't have permiss... 527132 nautilus crash when making ftp connection 532852 CRITICAL **: totem_pl_parser_parse_with_base: assertion `... 534759 Build failure in gio 534764 Typo in error produced by g_file_make_directory 521851 Redudant tests in gunixmounts.c 524344 glib/gthread.h still use G_GNUC_PRETTY_FUNCTION 525060 glib fails to build with -DG_DISABLE_ASSERT in CPPFLAGS o... 534177 Invalid description of the interface g_cclosure_marshal_S... 520715 Add GFile method g_file_query_file_type 523039 nautilus can't access to trash/computer/network if gvfs i... * Updated translations: Arabic (ar) Bulgarian (bg) Catalan (ca) Czech (cs) Greek (el) Candian English (en_CA) British English (en_GB) Spanish (es) Estonian (et) Basque (eu) Galician (gl) Hebrew (he) Hungarian (hu) Japanese (ja) Lithuanian (lt) Norwegian bokmål (nb) Dutch (nl) Occitan (oc) Portugese (pt) Russian (ru) Slovak (sk) Albanian (sq) Swedish (sv) Turkish (tr) Vietnamese (vi) Thanks to all contributors: Tor Lillqvist Alexander Larsson Michael Natterer Tim Janik Sebastian Dröge Felix Riemann Emmanuele Bassi Claudio Saavedra Hiroyuki Ikezoe Peter Kjellerstedt Arfrever Frehtes Taifersar Arahesis Rodrigo Moya Samuel Thibault Neil Roberts Lieven van der Heide John Ehresman Yukihiro Nakadaira Salvatore Iovene Cody Russell Olivier Crete Sjoerd Simons Behdad Esfahbod Federico Mena Quintero Mathias Hasselmann Mukund Sivaraman Jeffrey Stedfast Mukund Sivaraman Hans Breuer Kjartan Maraas Ted Percival Simon Zheng Benjamin Otte Vlad Grecescu Tomas Bzatek Lin Ma Joe Marcus Clarke Jens Granseuer Josselin Mouette David Zeuthen Sebastien Bacher A. Walton Rob Bradford Mikkel Kamstrup Erlandsen Christian Kellner Padraig O'Briain Michael Meeks Joe Shaw Bastien Nocera Ross Burton Areg Beketovski May 27, 2008 Matthias Clasen _______________________________________________
  9. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200805-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Roundup: Permission bypass Date: May 27, 2008 Bugs: #212488, #214666 ID: 200805-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in Roundup allows for bypassing permission restrictions. Background ========== Roundup is an issue-tracking system with command-line, web and e-mail interfaces. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-apps/roundup < 1.4.4-r1 >= 1.4.4-r1 Description =========== Philipp Gortan reported that the xml-rpc server in Roundup does not check property permissions (CVE-2008-1475). Furthermore, Roland Meister discovered multiple vulnerabilities caused by unspecified errors, some of which may be related to cross-site scripting (CVE-2008-1474). Impact ====== A remote attacker could possibly exploit the first vulnerability to edit or view restricted properties via the list(), display(), and set() methods. The impact and attack vectors of the second vulnerability are unknown. Workaround ========== There is no known workaround at this time. Resolution ========== All Roundup users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/roundup-1.4.4-r1" References ========== [ 1 ] CVE-2008-1474 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1474 [ 2 ] CVE-2008-1475 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1475 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200805-21.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security ( -at -) gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
  10. Hi, We've just posted a new article on our website, Hardware Secrets. Title: Logitech V220 Cordless Mouse Review Link: http://www.hardwaresecrets.com/article/559 Category: Tutorials Summary: We tested Logitech’s newest addition to its line of laptop mice, the V220. Here is a snippet: "Logitech currently has the "Ferrari of notebook mice" – the VX Revolution – to which we've given a stellar review. It's a great product, but sports a hefty price tag and it's a little too big considering it's a laptop mouse. There's now a viable alternative from Logitech in terms of size and price: the V220 cordless optical mouse. It has some cool features (rubber grip, programmable scroll wheel) and some cost-effective solutions, like having an optical sensor instead of a laser. But this doesn't mean it's any less precise than its laser-based counterparts, as we'll see further along in this review." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com ---------------------------------------------------------------------
  11. Hello, - Guitar Hero World Tour Drum Kit Trailer http://www.gamershell.com/news_51464.html - Strategy First Signs UberSoldier 2: The End of Hitler http://www.gamershell.com/news_51462.html - Dance Dance Revolution Goes Mobile http://www.gamershell.com/news_51460.html - Buku Sudoku Coming to Xbox LIVE Arcade #2 http://www.gamershell.com/news_51458.html - Major League Eating: The Game - Character Bios #2/Screens #3 http://www.gamershell.com/news_51456.html - Enemy Territory: Quake Wars Ships for PS3 and Xbox 360 http://www.gamershell.com/news_51454.html Best Regards, GamersHell.com Staff =============================================================================
  12. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Open-Source RadeonHD Driver Delivers AMD 780 Support ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=12399 Summary: "While the RadeonHD developers have been busy working on Radeon HD 3200 / 780 Series support and other features for this open-source ATI R500/600+ driver, the DRM (Direct Rendering Manager) support has been lagging behind. Earlier this month Matthias Hopf was successful in getting DRM working on an RS690 GPU and he has published RadeonHD DRM code into his personal development tree, but no code has yet to reach master. Meanwhile, as the xf86-video-ati driver is using AtomBIOS, they are able to spend more time working on the 3D features and other areas and less time "banging on registers" or even waiting on register documentation to arrive. David Airlie has been working on the R500 3D support along with Alex Deucher and Corbin Simpson. The trio has been making some great headway towards open-source 3D goodness for Radeon X1000 and HD 2000/3000 GPUs. Their most recent efforts have focused around the R500 fragment program code and today they have reached a monumental milestone." Please feel free to contact us with any questions or comments you may
  13. Hello, - Army of Two Veteran Map Pack Details and Trailer http://www.gamershell.com/news_51452.html - SEGA Extends Unreal Engine 3 License http://www.gamershell.com/news_51450.html - DDO: Stormreach The Way of the Monk Module Screens http://www.gamershell.com/news_51448.html - Sudden Strike 3: Arms for Victory - Ardennes Offensive Screens #7 http://www.gamershell.com/news_51444.html - Star Soldier R Tournament and Sweepstakes Announced http://www.gamershell.com/news_51442.html - Cal Ripken's Real Baseball Home-Run Derby Announced and Trailer http://www.gamershell.com/news_51440.html - SouthPeak Games Signs Brave: Shaman's Challenge http://www.gamershell.com/news_51438.html Best Regards, GamersHell.com Staff =============================================================================
  14. Hello Technology News Community, I4U NEWS has published a Boom Blox for Nintendo Wii Review. Quote from the review: "Today we are taking a look at EA and Steven Spielberg’s Boom Blox game for the Nintendo Wii. This game has modes for single and multiple players and features a full level editor to allow you to create your own levels. Spielberg says that he hopes Boom Blox will be fun for the entire family, and he certainly delivers; my entire family spent hours happily playing Boom Blox together. Usually the games I play aren’t anything my kids or wife likes and vice versa. Boom Blox on the other hand is a game that we all liked and had a lot of fun playing. The game is rate E for everyone and the controls are exceptionally easy to use and learn for gamers of all ages. Boom Blox is the family game to have for the Wii." Full Review: http://www.i4u.com/full-review-432.html Photo: http://www.i4u.com/images/2007/boomblox-stock.jpg Homepage Link: http://www.i4u.com We would very much appreciate if you post this news story/review on your site. As always I4U News is open to cross-post your technology stories. Please visit http://www.i4u.com for more stories. As long as you provide credits and links to the original story on I4U News we appreciate any cross-posting of our content. If you don't want to receive review and news submissions from I4U News please just reply to this email indicating that or use the unsubscribe link below. We appreciate giving us a chance to inform you about our latest reviews and please apologize if this email reaches you in error or does not meet your interest. best regards, Chief Editor Luigi Lugmayr :: I4U Technology News Network :: http://www.i4u.com - Technology News http://shop.i4u.com - I4U Shop http://pricewatch.i4u.com - Shopping Guide http://www.wristdreams.com - Technology Wrist Watches :::
  15. Hello, Kingston DataTraveler HyperX 4GB USB Stick Review "We take a closer look at the Kingston DataTraveler HyperX USB stick, testing performance and durability in this article which is first in a series. Can this supercharged USB stick serve as a portable HDD, available in sizes up to 8Gb there definitely is potential." http://www.madshrimps.be/gotoartik.php?articID=822 __________________ Thank you in advance for posting,
  16. Hello, - Sins of a Solar Empire v1.05 Patch http://www.gamershell.com/news_51446.html - Gunrox Beta Full Game Released http://www.gamershell.com/news_51436.html - New Titles Coming to Wii Shop Channel #67 http://www.gamershell.com/news_51434.html - Ground Environment X Now Available and Screens http://www.gamershell.com/news_51432.html - Meridian4 and Buka Entertainment Sign Deal http://www.gamershell.com/news_51430.html - Funcom and PayByCash Sign Deal http://www.gamershell.com/news_51428.html - We Ski/Family Ski New Screens http://www.gamershell.com/news_51424.html - Space Chimps Screens #3 http://www.gamershell.com/news_51422.html - Alone in the Dark Competition Revealed http://www.gamershell.com/news_51420.html - GamersHell.com Casual Games 27 May 2008 - Titan Attacks, Sultan's Labyrinth, Stardrone http://www.gamershell.com/news_51418.html Best Regards, GamersHell.com Staff =============================================================================
  17. Hi News Posters, I have completed the review for the Noctua NF-P12 Fan. Title: Noctua NF-P12 Silent Fan Review ( -at -) Tech-Reviews.co.uk Briefing: Earlier this week we reviewed a silent 92mm fan, this provided us with silent cooling at the front of our case. Today we've got another fan from well known PC silencers, Noctua. This model is the NF-P12, an oddly coloured peach and brown fan which should hopefully replace our noisy 120mm Antec rear fan. Just like most Noctua products, this fan is very innovative with notches cut into the many blades. But is such an innovative fan from Noctua worth buying? Link to Review: http://www.tech-reviews.co.uk/reviews/noctua-nf-p12-silent-fan/ Thumbnail: http://www.tech-reviews.co.uk/images/reviews/hardware/nfp12/thumb.jpg You may quote from the briefing above and use the provided thumbnail.
  18. TechwareLabs has published a review of the Spire Fourier IV CPU Cooler. Here's a clip from the review: Quote: Today Artiom takes a look at the high end CPU heatsink by Spire named the Fourier IV. We test out the Fourier IV in a current test rig to seeif it can handle the heat output of a quad core. Check out our take on the installation and performance of this copper beast. LINK: http://www.techwarelabs.com/reviews/cooling/Spire-FourierIV/ Title: Spire Fourier IV CPU Cooler Review ( -at -) TechwareLabs Image: http://www.techwarelabs.com/reviews/cooling/Spire-FourierIV/images/spire05_tn.jpg A news post would be greatly appreciated!
  19. Hello Everyone, Dell's XPS branded products have come a long way since they first appeared in 1993. Starting life as a performance trim for the Dimension product line, Dell has nurtured XPS into a well-known and respected premium performance brand. While not all XPS branded products are specifically targeted at gamers, gaming has always been at the core of the product line-up. The XPS brand's flagship desktop and notebook products have always been heavily gaming oriented, but it looks like that is set to change. The XPS 730 is Dell's latest XPS flagship desktop product, the fourth generation of the XPS 700 series, and it may be the last. Or at least the last XPS flagship product as we currently know them; large, aggressively styled behemoths sporting the latest hardware and adorned with colorful LED lighting. A week after the XPS 730 was launched, news regarding the demise of XPS as a gaming brand began to circulate. Since its acquisition of Alienware in the summer of 2006, Dell has effectively been operating two separate gaming brands with directly competing products. It was speculated that some changes, possibly in the form of consolidation of the two brands, would eventually be in order. It is now fairly clear that Dell is to focus on Alienware as its premier gaming brand in the future. But that didn't stop the company from producing the best XPS gaming to date. Head on over to the site and take a look... Article URL: http://www.hothardware.com/Articles/Dell_XPS_730_H2C_Performance_Gaming_Syst em/ Site: http://www.hothardware.com/ As always, a link in your news sections would be much appreciated! If you'd like us to return the favor, please don't hesitate to send your press
  20. Hey Everyone, We've posted a new review on 3DXtreme.net - OCZ PC2-8500 Reaper HPC DDR2-1066 4GB Edition. Here's a clip: "During the real world results the OCZ Reaper PC2-1066 kit gaming performance felt smoother to me. Overclockers will appreciate and utilize the extra headroom DDR2-1066 provides...." We would appreciate a posting in your Daily News! Name - OCZ PC2-8500 Reaper HPC DDR2-1066 4GB Edition Review ( -at -) 3DXtreme Link - http://www.3dxtreme.net/index.php?id=oczreaper4096-pc28500p1
  21. Hi, XSReviews have posted a new review. Clickshot has reviewed the *Coolermaster Z600 CPU cooler **Title:* Coolermaster Z600 Review ( -at -) XSReviews *Review Link**:* http://www.xsreviews.co.uk/reviews/cpu-coolers/coolermaster-z600/1 *Small Thumbnail:* http://www.xsreviews.co.uk/images/thumbs/z600.jpg *Large Thumnail: *http://www.xsreviews.co.uk/images/thumbs/z600-l.jpg *Quote:* "With more and more emphasis being put on the cooling proficiency and the quietness of cooling products, many people are beginning to look try different ways to keeping their PC chilled at a reasonable noise level. One of the most popular methods is to purchase a passive cooler, I.E. one without a fan. But can these fanless coolers really live up to their fan-covered ancestors? That's the question that begs to be answered, so Coolermaster have sent me the Z600 to check out. " *A news post on your site would be very much appreciated. We would also love you to add us to your news list, so if you are interested in us posting your news on our site, then please send all news to the email below! If you like our site and would like to swap links and become a site affiliate then please email us as well. RSS Feed: * <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews'>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>* <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews> *Thanks Jon "Whoopty" Martindale www.xsreviews.co.uk <http://www.xsreviews.co.uk>
  22. Almost a year has passed since our first CPU value article. Since then, we've taken a look at the value propositions of current graphics processors, but we haven't taken another shot at CPUs--until today, that is. Fresh from our review of AMD's triple-core Phenom X3 processors, we've gathered all of our benchmark results and tossed current official pricing into the equation to see how much bang Intel's and AMD's latest processors deliver for your buck. In this look at the CPU market, we explore how value scales across two, three, and four cores, whether bargain prices make AMD's Phenoms attractive from a value perspective, and how Intel's blazing-fast dual-core CPUs like the Core 2 Duo E8400 fit into the picture. Our results span 20 processors, 18 different benchmarks, and some custom tests that take power efficiency and more complete system pricing into account. Keep reading to see where the best values lie in the CPU market. http://techreport.com/articles.x/14756 Thanks, Scott __ Scott Wasson The Tech Report PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link:
  23. Changes since 2.22.1 -------------------- accessibility: - Don't show the "accessible login" button if gdmsetup is not available (Matthias Clasen) (#526944) updated translations: - bg (Yavor Doganov) - fr (Stephane Raimbault) - hu (Gabor Kelemen) Availability ------------ http://download.gnome.org/sources/gnome-control-center/2.22/ Contact ------- * Bugs in http://bugzilla.gnome.org
  24. Changes since 2.22.1 -------------------- - Fix background change notification and make background handling work again for people running a session without nautilus (Matthias Clasen) (#531487) - Updated translations: - bg (Yavor Doganov) - th (Theppitak Karoonboonyanan) Availability ------------ http://download.gnome.org/sources/gnome-settings-daemon/2.22/ Contact ------- * Bugs in http://bugzilla.gnome.org
  25. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ---------------------------------------------------------------------- Debian Security Advisory DSA-1588-1 security ( -at -) debian.org http://www.debian.org/security/ dann frazier May 27, 2008 http://www.debian.org/security/faq - ---------------------------------------------------------------------- Package : linux-2.6 Vulnerability : denial of service Problem type : local/remote Debian-specific: no CVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137 Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6712 Johannes Bauer discovered an integer overflow condition in the hrtimer subsystem on 64-bit systems. This can be exploited by local users to trigger a denial of service (DoS) by causing the kernel to execute an infinite loop. CVE-2008-1615 Jan Kratochvil reported a local denial of service condition that permits local users on systems running the amd64 flavor kernel to cause a system crash. CVE-2008-2136 Paul Harks discovered a memory leak in the Simple Internet Transition (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited by remote users to cause a denial of service condition. CVE-2008-2137 David Miller and Jan Lieskovsky discovered issues with the virtual address range checking of mmaped regions on the sparc architecture that may be exploited by local users to cause a denial of service. For the stable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-18etch5. Builds for linux-2.6/s390 and fai-kernels/powerpc were not yet available at the time of this advisory. This advisory will be updated as these builds become available. We recommend that you upgrade your linux-2.6, fai-kernels, and user-mode-linux packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages The following matrix lists additional source packages that were rebuilt for compatability with or to take advantage of this update: Debian 4.0 (etch) fai-kernels 1.17+etch.18etch5 user-mode-linux 2.6.18-1um-2etch.18etch5 You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - ------------------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, and sparc. Source archives: http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743 http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06 http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c Architecture independent packages: http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405 http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e arm architecture (ARM) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8 http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 54186 24256be3de335798d64096467935c740 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221 http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df These changes will probably be included in the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
×