news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
It was many months ago that ThermalTake released their first PSUs, these were good enough for them to start gaining a strong reputation in this highly competitive market. Today we will take a look at their affordable, mid-range PSU, the ToughPower 500W. The ToughPower 500W is a modular and silent PSU, but is it good enough to compete in the wide spanning but budget minded mid-range market? http://www.driverheaven.net/reviews.php?reviewid=553 ___________________________________ Driver Heaven News Mailer
-
<http://www.guru3d.com/article/mainboard/525/>'>http://www.guru3d.com/article/mainboard/525/> EVGA nForce 750i SLI FTW For The Win review eVGA decided to make a new cheaper mainboard opposed to 780/790, designed it l33t and [censored]y.They named their new baby the eVGA nForce 750 FTW. Where FTW literally means "For The Win". Now if you send a product with "FTW" in the actual name then as a company you need to have some pretty big balls, as any reviewer will see if that product lives up-to the reputation. Read the full review here: http://www.guru3d.com/article/mainboard/525/ <http://www.guru3d.com/article/mainboard/525/> --
-
A news post would be great. OCC has published a new review of the Gigabyte GA-MA78GM-SH2 Here is a quote from the review: Quote: "I went into this review with a mindset that this board is geared to being used in a workstation or Home Theater PC and at that, it does very well. In the science benchmarks, the Gigabyte GA-MA78GM-SH2 pulls off some impressive numbers compared to competing boards using the same chipset. The Gigabyte board has an array of features and capabilities that would make any system like this drool for more. I liked how Gigabyte included all three video ports for this board because if you are like me and lose adapters easily, you will not be left out from using them down the road. Another feature of note i absolutely loved is the number of USB headers available. For a media PC or workstation, that is a great move." Title: Gigabyte GA-MA78GM-SH2 Review Link: http://www.overclockersclub.com/reviews/gigabyte_gama78gms2h/ Img: http://www.overclockersclub.com/siteimages/articles/gigabyte_gama78gms2h/7_thumb.jpg
-
Hello Webmasters and News Posters, NEW CONTENT (Visual) - Zalman TRIMON 22" 3D Monitor – Exclusive QUOTE: "The existence of the 3D concept has been around since people could express themselves artistically; for example, through painting or sculptures. When the first such expression began, I certainly could not tell you. However, I can tell you that 3D has evolved to the point where it is now commercially available for the average user for under $1000 USD. Admittedly that’s a lot more than most would want to pay for it, but it is a positive step in the right direction. The TRIMON is the first commercial 3D monitor available to the public from Zalman, and it is not often one gets to be the first to review a finally finished product. We have been waiting for these ZM-M220W monitors to hit the shelves for a little over a year now, with the first introduction of them at CEBIT 2007." For more information, please visit - http://www.tweaktown.com/reviews/1391/zalman_trimon_22_3d_monitor_exclusive/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
-
Hardware Canucks is pleased to present our review of the Coolink Chipchilla Chipset Cooler. Quote: When it comes to cooling computers most people understand the need for CPU and graphics coolers but overlook the lowly motherboard chipset. The importance of the Northbridge and Southbridge chipsets is seemingly underestimated by most consumers and this carries over onto how most manufacturers cool them (i.e. as cheaply as possible). On most entry, mid and even some high-end boards, people think that it is more than acceptable to have a small chunk of aluminum as a Northbridge cooling solution. Link: http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/5547-coolink-chipchilla-chipset-cooler-review.html Image: http://images.hardwarecanucks.com/image/akg/Air_Cooling/chipchilla/chilla_sm.jpg Regards,Hardware Canucks News
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ImageMagick security update Advisory ID: RHSA-2008:0145-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0145.html Issue date: 2008-04-16 Keywords: heap stack buffer integer overflow CVE Names: CVE-2007-1797 CVE-2007-4985 CVE-2007-4986 CVE-2007-4988 CVE-2008-1096 CVE-2008-1097 ===================================================================== 1. Summary: Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux versions 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially-crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially-crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) An integer overflow flaw was found in ImageMagick's DIB parsing code. If a victim opened a specially-crafted DIB file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4988) A heap-based buffer overflow flaw was found in the way ImageMagick parsed XCF files. If a specially-crafted XCF image was opened, ImageMagick could be made to overwrite heap memory beyond the bounds of its allocated memory. This could, potentially, allow an attacker to execute arbitrary code on the machine running ImageMagick. (CVE-2008-1096) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially-crafted PCX file, an attacker could possibly execute arbitrary code on the victim's machine. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 235071 - CVE-2007-1797 Heap overflow in ImageMagick's DCM and XWD coders 285861 - CVE-2008-1097 Memory corruption in ImageMagick's PCX coder 286411 - CVE-2008-1096 Out of bound write in ImageMagick's XCF coder 310081 - CVE-2007-4988 Integer overflow in ImageMagick's DIB coder 310091 - CVE-2007-4985 Infinite loops in ImageMagick's XCF and DCM coders 310121 - CVE-2007-4986 Multiple integer overflows in ImageMagick 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ImageMagick-5.5.6-28.src.rpm i386: ImageMagick-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-devel-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-devel-5.5.6-28.i386.rpm ImageMagick-perl-5.5.6-28.i386.rpm ia64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.ia64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.ia64.rpm ImageMagick-c++-devel-5.5.6-28.ia64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.ia64.rpm ImageMagick-devel-5.5.6-28.ia64.rpm ImageMagick-perl-5.5.6-28.ia64.rpm ppc: ImageMagick-5.5.6-28.ppc.rpm ImageMagick-5.5.6-28.ppc64.rpm ImageMagick-c++-5.5.6-28.ppc.rpm ImageMagick-c++-5.5.6-28.ppc64.rpm ImageMagick-c++-devel-5.5.6-28.ppc.rpm ImageMagick-debuginfo-5.5.6-28.ppc.rpm ImageMagick-debuginfo-5.5.6-28.ppc64.rpm ImageMagick-devel-5.5.6-28.ppc.rpm ImageMagick-perl-5.5.6-28.ppc.rpm s390: ImageMagick-5.5.6-28.s390.rpm ImageMagick-c++-5.5.6-28.s390.rpm ImageMagick-c++-devel-5.5.6-28.s390.rpm ImageMagick-debuginfo-5.5.6-28.s390.rpm ImageMagick-devel-5.5.6-28.s390.rpm ImageMagick-perl-5.5.6-28.s390.rpm s390x: ImageMagick-5.5.6-28.s390.rpm ImageMagick-5.5.6-28.s390x.rpm ImageMagick-c++-5.5.6-28.s390.rpm ImageMagick-c++-5.5.6-28.s390x.rpm ImageMagick-c++-devel-5.5.6-28.s390x.rpm ImageMagick-debuginfo-5.5.6-28.s390.rpm ImageMagick-debuginfo-5.5.6-28.s390x.rpm ImageMagick-devel-5.5.6-28.s390x.rpm ImageMagick-perl-5.5.6-28.s390x.rpm x86_64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.x86_64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.x86_64.rpm ImageMagick-c++-devel-5.5.6-28.x86_64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.x86_64.rpm ImageMagick-devel-5.5.6-28.x86_64.rpm ImageMagick-perl-5.5.6-28.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ImageMagick-5.5.6-28.src.rpm i386: ImageMagick-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-devel-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-devel-5.5.6-28.i386.rpm ImageMagick-perl-5.5.6-28.i386.rpm x86_64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.x86_64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.x86_64.rpm ImageMagick-c++-devel-5.5.6-28.x86_64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.x86_64.rpm ImageMagick-devel-5.5.6-28.x86_64.rpm ImageMagick-perl-5.5.6-28.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ImageMagick-5.5.6-28.src.rpm i386: ImageMagick-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-devel-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-devel-5.5.6-28.i386.rpm ImageMagick-perl-5.5.6-28.i386.rpm ia64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.ia64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.ia64.rpm ImageMagick-c++-devel-5.5.6-28.ia64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.ia64.rpm ImageMagick-devel-5.5.6-28.ia64.rpm ImageMagick-perl-5.5.6-28.ia64.rpm x86_64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.x86_64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.x86_64.rpm ImageMagick-c++-devel-5.5.6-28.x86_64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.x86_64.rpm ImageMagick-devel-5.5.6-28.x86_64.rpm ImageMagick-perl-5.5.6-28.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ImageMagick-5.5.6-28.src.rpm i386: ImageMagick-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-devel-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-devel-5.5.6-28.i386.rpm ImageMagick-perl-5.5.6-28.i386.rpm ia64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.ia64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.ia64.rpm ImageMagick-c++-devel-5.5.6-28.ia64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.ia64.rpm ImageMagick-devel-5.5.6-28.ia64.rpm ImageMagick-perl-5.5.6-28.ia64.rpm x86_64: ImageMagick-5.5.6-28.i386.rpm ImageMagick-5.5.6-28.x86_64.rpm ImageMagick-c++-5.5.6-28.i386.rpm ImageMagick-c++-5.5.6-28.x86_64.rpm ImageMagick-c++-devel-5.5.6-28.x86_64.rpm ImageMagick-debuginfo-5.5.6-28.i386.rpm ImageMagick-debuginfo-5.5.6-28.x86_64.rpm ImageMagick-devel-5.5.6-28.x86_64.rpm ImageMagick-perl-5.5.6-28.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ImageMagick-6.0.7.1-17.el4_6.1.src.rpm i386: ImageMagick-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.i386.rpm ia64: ImageMagick-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.ia64.rpm ppc: ImageMagick-6.0.7.1-17.el4_6.1.ppc.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.ppc.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.ppc.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.ppc.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.ppc.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.ppc.rpm s390: ImageMagick-6.0.7.1-17.el4_6.1.s390.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.s390.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.s390.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.s390.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.s390.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.s390.rpm s390x: ImageMagick-6.0.7.1-17.el4_6.1.s390x.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.s390x.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.s390x.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.s390x.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.s390x.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.s390x.rpm x86_64: ImageMagick-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ImageMagick-6.0.7.1-17.el4_6.1.src.rpm i386: ImageMagick-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.i386.rpm x86_64: ImageMagick-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ImageMagick-6.0.7.1-17.el4_6.1.src.rpm i386: ImageMagick-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.i386.rpm ia64: ImageMagick-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.ia64.rpm x86_64: ImageMagick-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ImageMagick-6.0.7.1-17.el4_6.1.src.rpm i386: ImageMagick-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.i386.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.i386.rpm ia64: ImageMagick-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.ia64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.ia64.rpm x86_64: ImageMagick-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-c++-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-debuginfo-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-devel-6.0.7.1-17.el4_6.1.x86_64.rpm ImageMagick-perl-6.0.7.1-17.el4_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/ImageMagick-6.2.8.0-4.el5_1.1.src.rpm i386: ImageMagick-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.i386.rpm x86_64: ImageMagick-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/ImageMagick-6.2.8.0-4.el5_1.1.src.rpm i386: ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.i386.rpm x86_64: ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/ImageMagick-6.2.8.0-4.el5_1.1.src.rpm i386: ImageMagick-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.i386.rpm ia64: ImageMagick-6.2.8.0-4.el5_1.1.ia64.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.ia64.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.ia64.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.ia64.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.ia64.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.ia64.rpm ppc: ImageMagick-6.2.8.0-4.el5_1.1.ppc.rpm ImageMagick-6.2.8.0-4.el5_1.1.ppc64.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.ppc.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.ppc64.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.ppc.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.ppc64.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.ppc.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.ppc64.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.ppc.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.ppc64.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.ppc.rpm s390x: ImageMagick-6.2.8.0-4.el5_1.1.s390.rpm ImageMagick-6.2.8.0-4.el5_1.1.s390x.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.s390.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.s390x.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.s390.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.s390x.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.s390.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.s390x.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.s390.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.s390x.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.s390x.rpm x86_64: ImageMagick-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-c++-devel-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-debuginfo-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.i386.rpm ImageMagick-devel-6.2.8.0-4.el5_1.1.x86_64.rpm ImageMagick-perl-6.2.8.0-4.el5_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIBqvBXlSAg2UNWIIRAlWiAJ0XTtcfcFxNL6GWXQbsVDcX53PlPwCfX8oj xfBG7uWthWpzS3H+9kH8aq8= =x9+n -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: ImageMagick security update Advisory ID: RHSA-2008:0165-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0165.html Issue date: 2008-04-16 Keywords: heap stack buffer integer overflow CVE Names: CVE-2007-1797 CVE-2007-4985 CVE-2007-4986 CVE-2008-1097 ===================================================================== 1. Summary: Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux version 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Description: ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially-crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially-crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially-crafted PCX file, an attacker could possibly execute arbitrary code with the privileges of the user running ImageMagick.. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 235071 - CVE-2007-1797 Heap overflow in ImageMagick's DCM and XWD coders 285861 - CVE-2008-1097 Memory corruption in ImageMagick's PCX coder 310091 - CVE-2007-4985 Infinite loops in ImageMagick's XCF and DCM coders 310121 - CVE-2007-4986 Multiple integer overflows in ImageMagick 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ImageMagick-5.3.8-21.src.rpm i386: ImageMagick-5.3.8-21.i386.rpm ImageMagick-c++-5.3.8-21.i386.rpm ImageMagick-c++-devel-5.3.8-21.i386.rpm ImageMagick-devel-5.3.8-21.i386.rpm ImageMagick-perl-5.3.8-21.i386.rpm ia64: ImageMagick-5.3.8-21.ia64.rpm ImageMagick-c++-5.3.8-21.ia64.rpm ImageMagick-c++-devel-5.3.8-21.ia64.rpm ImageMagick-devel-5.3.8-21.ia64.rpm ImageMagick-perl-5.3.8-21.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ImageMagick-5.3.8-21.src.rpm ia64: ImageMagick-5.3.8-21.ia64.rpm ImageMagick-c++-5.3.8-21.ia64.rpm ImageMagick-c++-devel-5.3.8-21.ia64.rpm ImageMagick-devel-5.3.8-21.ia64.rpm ImageMagick-perl-5.3.8-21.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ImageMagick-5.3.8-21.src.rpm i386: ImageMagick-5.3.8-21.i386.rpm ImageMagick-c++-5.3.8-21.i386.rpm ImageMagick-c++-devel-5.3.8-21.i386.rpm ImageMagick-devel-5.3.8-21.i386.rpm ImageMagick-perl-5.3.8-21.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ImageMagick-5.3.8-21.src.rpm i386: ImageMagick-5.3.8-21.i386.rpm ImageMagick-c++-5.3.8-21.i386.rpm ImageMagick-c++-devel-5.3.8-21.i386.rpm ImageMagick-devel-5.3.8-21.i386.rpm ImageMagick-perl-5.3.8-21.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIBqvJXlSAg2UNWIIRAkoHAKC1HZiQLqsXQet7yBIiEdcI+1IgmQCfXkX7 km6xcRXUuiZIUDvLFcP3BlM= =zzG4 -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2008:0222-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0222.html Issue date: 2008-04-16 CVE Names: CVE-2008-1380 ===================================================================== 1. Summary: Updated firefox packages that fix a security bug are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Mozilla Firefox is an open source Web browser. A flaw was found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-1380) All Firefox users should upgrade to these updated packages, which contain backported patches that correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 440518 - CVE-2008-1380 Firefox JavaScript garbage collection crash 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.12-0.15.el4.src.rpm i386: firefox-1.5.0.12-0.15.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.15.el4.i386.rpm ia64: firefox-1.5.0.12-0.15.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.ia64.rpm ppc: firefox-1.5.0.12-0.15.el4.ppc.rpm firefox-debuginfo-1.5.0.12-0.15.el4.ppc.rpm s390: firefox-1.5.0.12-0.15.el4.s390.rpm firefox-debuginfo-1.5.0.12-0.15.el4.s390.rpm s390x: firefox-1.5.0.12-0.15.el4.s390x.rpm firefox-debuginfo-1.5.0.12-0.15.el4.s390x.rpm x86_64: firefox-1.5.0.12-0.15.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.12-0.15.el4.src.rpm i386: firefox-1.5.0.12-0.15.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.15.el4.i386.rpm x86_64: firefox-1.5.0.12-0.15.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.12-0.15.el4.src.rpm i386: firefox-1.5.0.12-0.15.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.15.el4.i386.rpm ia64: firefox-1.5.0.12-0.15.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.ia64.rpm x86_64: firefox-1.5.0.12-0.15.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.12-0.15.el4.src.rpm i386: firefox-1.5.0.12-0.15.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.15.el4.i386.rpm ia64: firefox-1.5.0.12-0.15.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.ia64.rpm x86_64: firefox-1.5.0.12-0.15.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.15.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-1.5.0.12-15.el5_1.src.rpm i386: firefox-1.5.0.12-15.el5_1.i386.rpm firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm x86_64: firefox-1.5.0.12-15.el5_1.i386.rpm firefox-1.5.0.12-15.el5_1.x86_64.rpm firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm firefox-debuginfo-1.5.0.12-15.el5_1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-1.5.0.12-15.el5_1.src.rpm i386: firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm firefox-devel-1.5.0.12-15.el5_1.i386.rpm x86_64: firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm firefox-debuginfo-1.5.0.12-15.el5_1.x86_64.rpm firefox-devel-1.5.0.12-15.el5_1.i386.rpm firefox-devel-1.5.0.12-15.el5_1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-1.5.0.12-15.el5_1.src.rpm i386: firefox-1.5.0.12-15.el5_1.i386.rpm firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm firefox-devel-1.5.0.12-15.el5_1.i386.rpm ia64: firefox-1.5.0.12-15.el5_1.ia64.rpm firefox-debuginfo-1.5.0.12-15.el5_1.ia64.rpm firefox-devel-1.5.0.12-15.el5_1.ia64.rpm ppc: firefox-1.5.0.12-15.el5_1.ppc.rpm firefox-debuginfo-1.5.0.12-15.el5_1.ppc.rpm firefox-devel-1.5.0.12-15.el5_1.ppc.rpm s390x: firefox-1.5.0.12-15.el5_1.s390.rpm firefox-1.5.0.12-15.el5_1.s390x.rpm firefox-debuginfo-1.5.0.12-15.el5_1.s390.rpm firefox-debuginfo-1.5.0.12-15.el5_1.s390x.rpm firefox-devel-1.5.0.12-15.el5_1.s390.rpm firefox-devel-1.5.0.12-15.el5_1.s390x.rpm x86_64: firefox-1.5.0.12-15.el5_1.i386.rpm firefox-1.5.0.12-15.el5_1.x86_64.rpm firefox-debuginfo-1.5.0.12-15.el5_1.i386.rpm firefox-debuginfo-1.5.0.12-15.el5_1.x86_64.rpm firefox-devel-1.5.0.12-15.el5_1.i386.rpm firefox-devel-1.5.0.12-15.el5_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIBqwsXlSAg2UNWIIRAsMaAKCawB0j7Jc0BCb2rBM0/UAy526ehgCgvq8G 3Qe8sAws3CKuKIJ3xGhijRU= =CYe7 -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2008:0223-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0223.html Issue date: 2008-04-16 CVE Names: CVE-2008-1380 ===================================================================== 1. Summary: Updated seamonkey packages that fix a security issues are now available for Red Hat Enterprise Linux 2.1, Red Hat Enterprise Linux 3, and Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. A flaw was found in the processing of malformed JavaScript content. A web page containing such malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2008-1380) All SeaMonkey users should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 440518 - CVE-2008-1380 Firefox JavaScript garbage collection crash 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/seamonkey-1.0.9-0.15.el2.src.rpm i386: seamonkey-1.0.9-0.15.el2.i386.rpm seamonkey-chat-1.0.9-0.15.el2.i386.rpm seamonkey-devel-1.0.9-0.15.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.15.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.15.el2.i386.rpm seamonkey-mail-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.15.el2.i386.rpm seamonkey-nss-1.0.9-0.15.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.15.el2.i386.rpm ia64: seamonkey-1.0.9-0.15.el2.ia64.rpm seamonkey-chat-1.0.9-0.15.el2.ia64.rpm seamonkey-devel-1.0.9-0.15.el2.ia64.rpm seamonkey-dom-inspector-1.0.9-0.15.el2.ia64.rpm seamonkey-js-debugger-1.0.9-0.15.el2.ia64.rpm seamonkey-mail-1.0.9-0.15.el2.ia64.rpm seamonkey-nspr-1.0.9-0.15.el2.ia64.rpm seamonkey-nspr-devel-1.0.9-0.15.el2.ia64.rpm seamonkey-nss-1.0.9-0.15.el2.ia64.rpm seamonkey-nss-devel-1.0.9-0.15.el2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/seamonkey-1.0.9-0.15.el2.src.rpm ia64: seamonkey-1.0.9-0.15.el2.ia64.rpm seamonkey-chat-1.0.9-0.15.el2.ia64.rpm seamonkey-devel-1.0.9-0.15.el2.ia64.rpm seamonkey-dom-inspector-1.0.9-0.15.el2.ia64.rpm seamonkey-js-debugger-1.0.9-0.15.el2.ia64.rpm seamonkey-mail-1.0.9-0.15.el2.ia64.rpm seamonkey-nspr-1.0.9-0.15.el2.ia64.rpm seamonkey-nspr-devel-1.0.9-0.15.el2.ia64.rpm seamonkey-nss-1.0.9-0.15.el2.ia64.rpm seamonkey-nss-devel-1.0.9-0.15.el2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/seamonkey-1.0.9-0.15.el2.src.rpm i386: seamonkey-1.0.9-0.15.el2.i386.rpm seamonkey-chat-1.0.9-0.15.el2.i386.rpm seamonkey-devel-1.0.9-0.15.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.15.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.15.el2.i386.rpm seamonkey-mail-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.15.el2.i386.rpm seamonkey-nss-1.0.9-0.15.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.15.el2.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/seamonkey-1.0.9-0.15.el2.src.rpm i386: seamonkey-1.0.9-0.15.el2.i386.rpm seamonkey-chat-1.0.9-0.15.el2.i386.rpm seamonkey-devel-1.0.9-0.15.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.15.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.15.el2.i386.rpm seamonkey-mail-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-1.0.9-0.15.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.15.el2.i386.rpm seamonkey-nss-1.0.9-0.15.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.15.el2.i386.rpm Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.9-0.17.el3.src.rpm i386: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-chat-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-devel-1.0.9-0.17.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.17.el3.i386.rpm seamonkey-mail-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.17.el3.i386.rpm ia64: seamonkey-1.0.9-0.17.el3.ia64.rpm seamonkey-chat-1.0.9-0.17.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.ia64.rpm seamonkey-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.ia64.rpm seamonkey-mail-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.ia64.rpm ppc: seamonkey-1.0.9-0.17.el3.ppc.rpm seamonkey-chat-1.0.9-0.17.el3.ppc.rpm seamonkey-debuginfo-1.0.9-0.17.el3.ppc.rpm seamonkey-devel-1.0.9-0.17.el3.ppc.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.ppc.rpm seamonkey-js-debugger-1.0.9-0.17.el3.ppc.rpm seamonkey-mail-1.0.9-0.17.el3.ppc.rpm seamonkey-nspr-1.0.9-0.17.el3.ppc.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.ppc.rpm seamonkey-nss-1.0.9-0.17.el3.ppc.rpm seamonkey-nss-devel-1.0.9-0.17.el3.ppc.rpm s390: seamonkey-1.0.9-0.17.el3.s390.rpm seamonkey-chat-1.0.9-0.17.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.17.el3.s390.rpm seamonkey-devel-1.0.9-0.17.el3.s390.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.s390.rpm seamonkey-js-debugger-1.0.9-0.17.el3.s390.rpm seamonkey-mail-1.0.9-0.17.el3.s390.rpm seamonkey-nspr-1.0.9-0.17.el3.s390.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.s390.rpm seamonkey-nss-1.0.9-0.17.el3.s390.rpm seamonkey-nss-devel-1.0.9-0.17.el3.s390.rpm s390x: seamonkey-1.0.9-0.17.el3.s390x.rpm seamonkey-chat-1.0.9-0.17.el3.s390x.rpm seamonkey-debuginfo-1.0.9-0.17.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.17.el3.s390x.rpm seamonkey-devel-1.0.9-0.17.el3.s390x.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.s390x.rpm seamonkey-js-debugger-1.0.9-0.17.el3.s390x.rpm seamonkey-mail-1.0.9-0.17.el3.s390x.rpm seamonkey-nspr-1.0.9-0.17.el3.s390.rpm seamonkey-nspr-1.0.9-0.17.el3.s390x.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.s390x.rpm seamonkey-nss-1.0.9-0.17.el3.s390.rpm seamonkey-nss-1.0.9-0.17.el3.s390x.rpm seamonkey-nss-devel-1.0.9-0.17.el3.s390x.rpm x86_64: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-1.0.9-0.17.el3.x86_64.rpm seamonkey-chat-1.0.9-0.17.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.x86_64.rpm seamonkey-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.x86_64.rpm seamonkey-mail-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.9-0.17.el3.src.rpm i386: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-chat-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-devel-1.0.9-0.17.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.17.el3.i386.rpm seamonkey-mail-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.17.el3.i386.rpm x86_64: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-1.0.9-0.17.el3.x86_64.rpm seamonkey-chat-1.0.9-0.17.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.x86_64.rpm seamonkey-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.x86_64.rpm seamonkey-mail-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.9-0.17.el3.src.rpm i386: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-chat-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-devel-1.0.9-0.17.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.17.el3.i386.rpm seamonkey-mail-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.17.el3.i386.rpm ia64: seamonkey-1.0.9-0.17.el3.ia64.rpm seamonkey-chat-1.0.9-0.17.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.ia64.rpm seamonkey-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.ia64.rpm seamonkey-mail-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-1.0.9-0.17.el3.x86_64.rpm seamonkey-chat-1.0.9-0.17.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.x86_64.rpm seamonkey-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.x86_64.rpm seamonkey-mail-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.9-0.17.el3.src.rpm i386: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-chat-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-devel-1.0.9-0.17.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.17.el3.i386.rpm seamonkey-mail-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.17.el3.i386.rpm ia64: seamonkey-1.0.9-0.17.el3.ia64.rpm seamonkey-chat-1.0.9-0.17.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.ia64.rpm seamonkey-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.ia64.rpm seamonkey-mail-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.17.el3.i386.rpm seamonkey-1.0.9-0.17.el3.x86_64.rpm seamonkey-chat-1.0.9-0.17.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.17.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.17.el3.x86_64.rpm seamonkey-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.17.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.17.el3.x86_64.rpm seamonkey-mail-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.17.el3.i386.rpm seamonkey-nspr-1.0.9-0.17.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-1.0.9-0.17.el3.i386.rpm seamonkey-nss-1.0.9-0.17.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.17.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-16.el4.src.rpm i386: seamonkey-1.0.9-16.el4.i386.rpm seamonkey-chat-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-devel-1.0.9-16.el4.i386.rpm seamonkey-dom-inspector-1.0.9-16.el4.i386.rpm seamonkey-js-debugger-1.0.9-16.el4.i386.rpm seamonkey-mail-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-devel-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-devel-1.0.9-16.el4.i386.rpm ia64: seamonkey-1.0.9-16.el4.ia64.rpm seamonkey-chat-1.0.9-16.el4.ia64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.ia64.rpm seamonkey-devel-1.0.9-16.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-16.el4.ia64.rpm seamonkey-js-debugger-1.0.9-16.el4.ia64.rpm seamonkey-mail-1.0.9-16.el4.ia64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.ia64.rpm seamonkey-nspr-devel-1.0.9-16.el4.ia64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.ia64.rpm seamonkey-nss-devel-1.0.9-16.el4.ia64.rpm ppc: seamonkey-1.0.9-16.el4.ppc.rpm seamonkey-chat-1.0.9-16.el4.ppc.rpm seamonkey-debuginfo-1.0.9-16.el4.ppc.rpm seamonkey-devel-1.0.9-16.el4.ppc.rpm seamonkey-dom-inspector-1.0.9-16.el4.ppc.rpm seamonkey-js-debugger-1.0.9-16.el4.ppc.rpm seamonkey-mail-1.0.9-16.el4.ppc.rpm seamonkey-nspr-1.0.9-16.el4.ppc.rpm seamonkey-nspr-devel-1.0.9-16.el4.ppc.rpm seamonkey-nss-1.0.9-16.el4.ppc.rpm seamonkey-nss-devel-1.0.9-16.el4.ppc.rpm s390: seamonkey-1.0.9-16.el4.s390.rpm seamonkey-chat-1.0.9-16.el4.s390.rpm seamonkey-debuginfo-1.0.9-16.el4.s390.rpm seamonkey-devel-1.0.9-16.el4.s390.rpm seamonkey-dom-inspector-1.0.9-16.el4.s390.rpm seamonkey-js-debugger-1.0.9-16.el4.s390.rpm seamonkey-mail-1.0.9-16.el4.s390.rpm seamonkey-nspr-1.0.9-16.el4.s390.rpm seamonkey-nspr-devel-1.0.9-16.el4.s390.rpm seamonkey-nss-1.0.9-16.el4.s390.rpm seamonkey-nss-devel-1.0.9-16.el4.s390.rpm s390x: seamonkey-1.0.9-16.el4.s390x.rpm seamonkey-chat-1.0.9-16.el4.s390x.rpm seamonkey-debuginfo-1.0.9-16.el4.s390.rpm seamonkey-debuginfo-1.0.9-16.el4.s390x.rpm seamonkey-devel-1.0.9-16.el4.s390x.rpm seamonkey-dom-inspector-1.0.9-16.el4.s390x.rpm seamonkey-js-debugger-1.0.9-16.el4.s390x.rpm seamonkey-mail-1.0.9-16.el4.s390x.rpm seamonkey-nspr-1.0.9-16.el4.s390.rpm seamonkey-nspr-1.0.9-16.el4.s390x.rpm seamonkey-nspr-devel-1.0.9-16.el4.s390x.rpm seamonkey-nss-1.0.9-16.el4.s390.rpm seamonkey-nss-1.0.9-16.el4.s390x.rpm seamonkey-nss-devel-1.0.9-16.el4.s390x.rpm x86_64: seamonkey-1.0.9-16.el4.x86_64.rpm seamonkey-chat-1.0.9-16.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.x86_64.rpm seamonkey-devel-1.0.9-16.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-16.el4.x86_64.rpm seamonkey-mail-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-devel-1.0.9-16.el4.x86_64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.x86_64.rpm seamonkey-nss-devel-1.0.9-16.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-16.el4.src.rpm i386: seamonkey-1.0.9-16.el4.i386.rpm seamonkey-chat-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-devel-1.0.9-16.el4.i386.rpm seamonkey-dom-inspector-1.0.9-16.el4.i386.rpm seamonkey-js-debugger-1.0.9-16.el4.i386.rpm seamonkey-mail-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-devel-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-devel-1.0.9-16.el4.i386.rpm x86_64: seamonkey-1.0.9-16.el4.x86_64.rpm seamonkey-chat-1.0.9-16.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.x86_64.rpm seamonkey-devel-1.0.9-16.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-16.el4.x86_64.rpm seamonkey-mail-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-devel-1.0.9-16.el4.x86_64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.x86_64.rpm seamonkey-nss-devel-1.0.9-16.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-16.el4.src.rpm i386: seamonkey-1.0.9-16.el4.i386.rpm seamonkey-chat-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-devel-1.0.9-16.el4.i386.rpm seamonkey-dom-inspector-1.0.9-16.el4.i386.rpm seamonkey-js-debugger-1.0.9-16.el4.i386.rpm seamonkey-mail-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-devel-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-devel-1.0.9-16.el4.i386.rpm ia64: seamonkey-1.0.9-16.el4.ia64.rpm seamonkey-chat-1.0.9-16.el4.ia64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.ia64.rpm seamonkey-devel-1.0.9-16.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-16.el4.ia64.rpm seamonkey-js-debugger-1.0.9-16.el4.ia64.rpm seamonkey-mail-1.0.9-16.el4.ia64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.ia64.rpm seamonkey-nspr-devel-1.0.9-16.el4.ia64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.ia64.rpm seamonkey-nss-devel-1.0.9-16.el4.ia64.rpm x86_64: seamonkey-1.0.9-16.el4.x86_64.rpm seamonkey-chat-1.0.9-16.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.x86_64.rpm seamonkey-devel-1.0.9-16.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-16.el4.x86_64.rpm seamonkey-mail-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-devel-1.0.9-16.el4.x86_64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.x86_64.rpm seamonkey-nss-devel-1.0.9-16.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-16.el4.src.rpm i386: seamonkey-1.0.9-16.el4.i386.rpm seamonkey-chat-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-devel-1.0.9-16.el4.i386.rpm seamonkey-dom-inspector-1.0.9-16.el4.i386.rpm seamonkey-js-debugger-1.0.9-16.el4.i386.rpm seamonkey-mail-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-devel-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-devel-1.0.9-16.el4.i386.rpm ia64: seamonkey-1.0.9-16.el4.ia64.rpm seamonkey-chat-1.0.9-16.el4.ia64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.ia64.rpm seamonkey-devel-1.0.9-16.el4.ia64.rpm seamonkey-dom-inspector-1.0.9-16.el4.ia64.rpm seamonkey-js-debugger-1.0.9-16.el4.ia64.rpm seamonkey-mail-1.0.9-16.el4.ia64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.ia64.rpm seamonkey-nspr-devel-1.0.9-16.el4.ia64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.ia64.rpm seamonkey-nss-devel-1.0.9-16.el4.ia64.rpm x86_64: seamonkey-1.0.9-16.el4.x86_64.rpm seamonkey-chat-1.0.9-16.el4.x86_64.rpm seamonkey-debuginfo-1.0.9-16.el4.i386.rpm seamonkey-debuginfo-1.0.9-16.el4.x86_64.rpm seamonkey-devel-1.0.9-16.el4.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.el4.x86_64.rpm seamonkey-js-debugger-1.0.9-16.el4.x86_64.rpm seamonkey-mail-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-1.0.9-16.el4.i386.rpm seamonkey-nspr-1.0.9-16.el4.x86_64.rpm seamonkey-nspr-devel-1.0.9-16.el4.x86_64.rpm seamonkey-nss-1.0.9-16.el4.i386.rpm seamonkey-nss-1.0.9-16.el4.x86_64.rpm seamonkey-nss-devel-1.0.9-16.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIBqw0XlSAg2UNWIIRAt6kAJ97Y7bukfgmjr5STgqgNQ53GPXetACgsCyW MwKJKAh/ZUj2eWrrjDMmQfQ= =eUWZ -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: speex security update Advisory ID: RHSA-2008:0235-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0235.html Issue date: 2008-04-16 CVE Names: CVE-2008-1686 ===================================================================== 1. Summary: Updated speex packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Speex is a patent-free compression format designed especially for speech. The Speex package contains a library for handling Speex files and sample encoder and decoder implementations using this library. The Speex library was found to not properly validate input values read from the Speex files headers. An attacker could create a malicious Speex file that would crash an application or, possibly, allow arbitrary code execution with the privileges of the application calling the Speex library. (CVE-2008-1686) All users of speex are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 441239 - CVE-2008-1686 speex, libfishsound: insufficient boundary checks 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/speex-1.0.4-4.el4_6.1.src.rpm i386: speex-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-devel-1.0.4-4.el4_6.1.i386.rpm ia64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.ia64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.ia64.rpm speex-devel-1.0.4-4.el4_6.1.ia64.rpm ppc: speex-1.0.4-4.el4_6.1.ppc.rpm speex-1.0.4-4.el4_6.1.ppc64.rpm speex-debuginfo-1.0.4-4.el4_6.1.ppc.rpm speex-debuginfo-1.0.4-4.el4_6.1.ppc64.rpm speex-devel-1.0.4-4.el4_6.1.ppc.rpm s390: speex-1.0.4-4.el4_6.1.s390.rpm speex-debuginfo-1.0.4-4.el4_6.1.s390.rpm speex-devel-1.0.4-4.el4_6.1.s390.rpm s390x: speex-1.0.4-4.el4_6.1.s390.rpm speex-1.0.4-4.el4_6.1.s390x.rpm speex-debuginfo-1.0.4-4.el4_6.1.s390.rpm speex-debuginfo-1.0.4-4.el4_6.1.s390x.rpm speex-devel-1.0.4-4.el4_6.1.s390x.rpm x86_64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.x86_64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.x86_64.rpm speex-devel-1.0.4-4.el4_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/speex-1.0.4-4.el4_6.1.src.rpm i386: speex-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-devel-1.0.4-4.el4_6.1.i386.rpm x86_64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.x86_64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.x86_64.rpm speex-devel-1.0.4-4.el4_6.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/speex-1.0.4-4.el4_6.1.src.rpm i386: speex-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-devel-1.0.4-4.el4_6.1.i386.rpm ia64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.ia64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.ia64.rpm speex-devel-1.0.4-4.el4_6.1.ia64.rpm x86_64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.x86_64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.x86_64.rpm speex-devel-1.0.4-4.el4_6.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/speex-1.0.4-4.el4_6.1.src.rpm i386: speex-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-devel-1.0.4-4.el4_6.1.i386.rpm ia64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.ia64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.ia64.rpm speex-devel-1.0.4-4.el4_6.1.ia64.rpm x86_64: speex-1.0.4-4.el4_6.1.i386.rpm speex-1.0.4-4.el4_6.1.x86_64.rpm speex-debuginfo-1.0.4-4.el4_6.1.i386.rpm speex-debuginfo-1.0.4-4.el4_6.1.x86_64.rpm speex-devel-1.0.4-4.el4_6.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/speex-1.0.5-4.el5_1.1.src.rpm i386: speex-1.0.5-4.el5_1.1.i386.rpm speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm x86_64: speex-1.0.5-4.el5_1.1.i386.rpm speex-1.0.5-4.el5_1.1.x86_64.rpm speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm speex-debuginfo-1.0.5-4.el5_1.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/speex-1.0.5-4.el5_1.1.src.rpm i386: speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm speex-devel-1.0.5-4.el5_1.1.i386.rpm x86_64: speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm speex-debuginfo-1.0.5-4.el5_1.1.x86_64.rpm speex-devel-1.0.5-4.el5_1.1.i386.rpm speex-devel-1.0.5-4.el5_1.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/speex-1.0.5-4.el5_1.1.src.rpm i386: speex-1.0.5-4.el5_1.1.i386.rpm speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm speex-devel-1.0.5-4.el5_1.1.i386.rpm ia64: speex-1.0.5-4.el5_1.1.ia64.rpm speex-debuginfo-1.0.5-4.el5_1.1.ia64.rpm speex-devel-1.0.5-4.el5_1.1.ia64.rpm ppc: speex-1.0.5-4.el5_1.1.ppc.rpm speex-1.0.5-4.el5_1.1.ppc64.rpm speex-debuginfo-1.0.5-4.el5_1.1.ppc.rpm speex-debuginfo-1.0.5-4.el5_1.1.ppc64.rpm speex-devel-1.0.5-4.el5_1.1.ppc.rpm speex-devel-1.0.5-4.el5_1.1.ppc64.rpm s390x: speex-1.0.5-4.el5_1.1.s390.rpm speex-1.0.5-4.el5_1.1.s390x.rpm speex-debuginfo-1.0.5-4.el5_1.1.s390.rpm speex-debuginfo-1.0.5-4.el5_1.1.s390x.rpm speex-devel-1.0.5-4.el5_1.1.s390.rpm speex-devel-1.0.5-4.el5_1.1.s390x.rpm x86_64: speex-1.0.5-4.el5_1.1.i386.rpm speex-1.0.5-4.el5_1.1.x86_64.rpm speex-debuginfo-1.0.5-4.el5_1.1.i386.rpm speex-debuginfo-1.0.5-4.el5_1.1.x86_64.rpm speex-devel-1.0.5-4.el5_1.1.i386.rpm speex-devel-1.0.5-4.el5_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIBqw7XlSAg2UNWIIRAsJDAJ4sU533kOdChePFLZ227aOvXwxbngCdHmjW MLTP4d80DkxRHV0Ytb9nG/I= =ANwH -----END PGP SIGNATURE----- --
-
Good day, Today Neoseeker reviewed the Asus P5E-VM motherboard. This micro-atx mobo is a heck of an overclocker, and kicks butt. Here is the URL: http://www.neoseeker.com/Articles/Hardware/Reviews/asus_p5e_vm_hdmi/ Here is a quote: "With a video card, I was able to boot into the Windows desktop at 535MHz x 6 - but it was not stable; I think giving even more voltage to the northbridge would stabilize it, but frankly, I was worried about frying the northbridge. But 500MHz x 8 is stable, with the memory running at 5-5-5-15, when I use a video card." Thanks for any links! ___________________________ Kevin Spiess Editor, Neoseeker.com 604.247.8886 ext.101
-
This is a multi-part message in MIME format... ------------=_1208394430-11275-2783 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:087 http://www.mandriva.com/security/ _______________________________________________________________________ Package : policykit Date : April 16, 2008 Affected: 2008.1 _______________________________________________________________________ Problem Description: A format string vulnerability in the grant helper, in PolicyKit 0.7 and earlier, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in a password. The updated package has been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1658 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.1: aa8e182bb5e5d8fe952cfab4c62bf055 2008.1/i586/libpolkit2-0.7-5.1mdv2008.1.i586.rpm 2c2de3341fd2e7b0181215c49b373953 2008.1/i586/libpolkit-devel-0.7-5.1mdv2008.1.i586.rpm 54bc0d67f70ada707da9ac5d35ac6f8a 2008.1/i586/policykit-0.7-5.1mdv2008.1.i586.rpm 864e3c1f5c99ad74a284fe3f35964515 2008.1/i586/policykit-docs-0.7-5.1mdv2008.1.i586.rpm e19c68b55d06d4ad8a00a9c82e38e3fa 2008.1/SRPMS/policykit-0.7-5.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 79e9c91841bf90f09fd7184050164bfe 2008.1/x86_64/lib64polkit2-0.7-5.1mdv2008.1.x86_64.rpm 3bb998cc6595c0f70c47cb22f411962b 2008.1/x86_64/lib64polkit-devel-0.7-5.1mdv2008.1.x86_64.rpm 16ede4d785e987f5e65361570d80bcdc 2008.1/x86_64/policykit-0.7-5.1mdv2008.1.x86_64.rpm c114e50ab7f564a281ddd1096dbde53c 2008.1/x86_64/policykit-docs-0.7-5.1mdv2008.1.x86_64.rpm e19c68b55d06d4ad8a00a9c82e38e3fa 2008.1/SRPMS/policykit-0.7-5.1mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIBndVmqjQ0CJFipgRAtAPAKCGzbow3RcmLOWx7pcsGpW5Y+O6AQCglR6a RylBQh4kJd6y3YT4HJRk3FY= =sdlj -----END PGP SIGNATURE----- ------------=_1208394430-11275-2783 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1208394430-11275-2783--
-
Dear Media friends, APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! * Title: Thermaltake BlacX HDD Docking Station ( -at -) APH Networks * Description: SATA may be an interface that supports hot swap, but in reality, how often is it truly taken advantage of and used for the purpose of hot swapping? More than often, it's no more than just an array of disks residing inside our computers that ends up rarely moved. For an external interface, eSATA is nice and all for its performance, but to an extent that's really an extension of an internal storage medium to external hard drives -- hot swap is necessary as what's that made USB so popular, but it doesn't really solve the problem of having a need to go through a bunch of internal SATA hard drives quickly. For example, some users need it for testing hard drives, while others want to quickly pull some data off a drive without installing it in another computer. As far as I'm concerned, there's one product in the market that has gained immense popularity and tons of internet hype that allows you to quickly swap internal SATA hard drives without ripping anything apart to get the job done. And that's the Thermaltake BlacX, an HDD docking station. Let's see how it gets its job done, and to what extent it has done well. * Link: http://aphnetworks.com/reviews/thermaltake_blacx * Image: http://aphnetworks.com/review/thermaltake_blacx/008.JPG
-
plasq Releases Doozla v1.1.0 for Mac - Play to Learn - Published on 04/16/08 plasq today released Doozla 1.1.0 for Mac, their new full screen vector drawing application for kids. Doozla - A full screen children's drawing application, featuring simple free-hand drawing and color tools, webcam & tablet support, entertaining color-in templates and inspiring background images. Doozla - Play to Learn. San Francisco, CA - plasq today released Doozla 1.1.0 for Mac, their new full screen vector drawing application for kids. Doozla - A full screen children's drawing application, featuring simple free-hand drawing and color tools, webcam & tablet support, entertaining color-in templates and inspiring background images. Doozla has four creativity modes: Drawing - Free-hand drawing on a background, Coloring In - Add color and lines to the fun character templates provided, Draw on Background - Draw your own characters and objects into the provided background scenes, Webcam Drawing - Use your webcam to capture a picture and draw on top of it for lots of fun. Presenting a simple front interface, Doozla contains a pro-level drawing 'vector' engine underneath. The result is that every stroke of the mouse, or tablet pen produces smooth, attractive on-screen lines. In addition, drawings always print smoothly, without 'jaggies', no matter what size paper. "After chatting with teachers, we realized there was a need for a really simple, yet attractive kids drawing application for the Mac," said plasq CEO, Cris Pearson. "And Doozla was born!" Doozla's Home Screen encourages children to draw at any level of creative, from coloring-in, to complete-the-drawing, to a blank canvas. The Pen, Eraser, Line, Rectangle, Elipse, Bucket Fill and Letters tools can draw at different thicknesses and in a wide selection of colors. Spoken sound effects help with learning tool and color names in a fun way. All artwork can be saved in a .doozla format or can be printed to a PDF file or a printer. Doozla also offers options for password protecting the Print, Quit and Control Panel functions for parental or educator control and distraction removal. This update includes additional color-in art, commissioned from artists around the world. Included are historical and contemporary images, sophisticated backgrounds, color-in characters and scenes to entice students and young kids to color, complete or capture their own ideas. Doozla's four drawing options provide a guided start - whether that be an image, an iSight photo snap, a color-in image, or a blank canvas. Pricing and Availability: Doozla requires Mac OS X 10.4.6 or above and costs USD $24.95. Doozla Volume Education Licensing options are available. 30-day unhindered demo and instant download purchase directly from the plasq website. plasq Website: http://plasq.com Doozla: http://doozla.com Doozla Download: http://plasq.com/downloads/ Doozla Purchase: http://plasq.com/store/ Doozla Screenshots: http://plasq.com/doozla/ plasq's focus on creating intuitive, powerful and fun software is perfectly illustrated by their award-winning 'Comic Life' and much lauded 'Skitch'. This exciting think-tank of developers and user interface designers unites talent from The United States, Australia, Austria, France and Norway to make beautifully-designed and useful tools. ### Brian Caldwell Sr. Dir. Business Development +1 415-227-4165 brian ( -at -) plasq.com ******* Member wishes to have this product reviewed by the media *******
-
Dear Editors, we just posted a new interview which might be interesting to your readers. A post in your news section would be appreciated. Title: Interview with Alex 'Unwinder' / RivaTuner Link: http://www.techpowerup.com/reviews/Interviews/Alex_Unwinder/ Brief: The VGA Tweaking Utility RivaTuner has changed a lot over the years, and so has its creator. TPU talks with 'Unwinder' about software development and the role he played in starting the softmod community.
-
If you have a 360, or even a PS3 or just a PC, do yourself a favor and check out Assassin's Creed. The newly released PC version is supposed to have more side missions added in to keep you busy. Whatever system you get it for though, have some spare controller batteries around if you aren't running wired, you'll need them. This game can draw you in that much. Games like this should make you all happy you choose gaming as a pastime, and manages to deliver on every level, although a tiny bit more variation in missions would have been nice. Link: http://www.gamepyre.com/reviewsd.html?aid=953&p=1
-
[Security Announce] [ MDVA-2008:045 ] - Updated drakbt packages fix crash bug
news posted a topic in Upcoming News
This is a multi-part message in MIME format... ------------=_1208385357-11275-2782 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:045 http://www.mandriva.com/security/ _______________________________________________________________________ Package : drakbt Date : April 16, 2008 Affected: 2008.1 _______________________________________________________________________ Problem Description: A bug with drakbt caused it to crash when selecting private torrents. This update corrects the problem. _______________________________________________________________________ References: http://qa.mandriva.com/show_bug.cgi?id=40045 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.1: f8fac2767f727cdb30d5255294e30f30 2008.1/i586/drakbt-0.17.1-1.1mdv2008.1.noarch.rpm d0ca6b741a1d307c6842ede3dfa0be8a 2008.1/SRPMS/drakbt-0.17.1-1.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 29aca1baf3084e2dab7968a9c47fb60c 2008.1/x86_64/drakbt-0.17.1-1.1mdv2008.1.noarch.rpm d0ca6b741a1d307c6842ede3dfa0be8a 2008.1/SRPMS/drakbt-0.17.1-1.1mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIBlTamqjQ0CJFipgRAl0TAKCKCeGfgs8TZ/xfj1aZMyEVjHzMawCfW0rL 2rJx0GscrzKkZOjGtyYywbo= =OAyX -----END PGP SIGNATURE----- ------------=_1208385357-11275-2782 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1208385357-11275-2782-- -
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: BeleniX 0.7 OpenSolaris Desktop ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=12217 Summary: "Long before Sun's Project Indiana came about, BeleniX has been one of our favorite GNU/Solaris distributions. BeleniX has been a LiveCD based upon OpenSolaris, but with yesterday's release of BeleniX 0.7 it is now a source-level derivative of the Project Indiana blend of OpenSolaris. Today we're taking a quick look at this new release." Please feel free to contact us with any questions or comments you may
-
Beginners Guides: Linux Part 3: Installing New Software "In the first two parts of our set of Beginner's Guides to the Linux operating system, we familiarized you with the popular KDE desktop environment via a 'live' CD Linux distribution and explored installing Linux permanently onto your system. In this third PCSTATS Beginner's Guide to the Linux operating system, we're going to explore an essential Linux skill; how to track down and add new software packages to your Linux installation." REVIEW URL: http://www.pcstats.com/articleview.cfm?articleID=1788TAG-LINE: Beginners Guides: Linux Part 3: Installing New Software ( -at -) PCSTATS.com
-
Apple Switcher Ellen Feiss' film to air online - Published on 04/16/08 TheDigitalLifestyle will be doing a one-time only broadcast of the film "Bed & Breakfast, featuring Ellen Feiss of Apple's "Switch" campaign. Viewers will be able to chat about the film as they watch it. The film will be broadcast Monday, April 21, at 9:30PM ET / 6:30PM PT. Philadelphia, PA - Ellen Feiss, one of the stars of Apple's "Switch" ad campaign will appear in the film "Bed & Breakfast" on TheDigitalLifestyle.tv. The film, shot in France in 2006, follows a young American couple on vacation in France looking for an old friend who has inherited a castle. The film marks the screen debut for Feiss, who became an internet celebrity following her appearance in one of the initial "Switch" campaign ads from Apple. The film marks the first fictional programming for The Digital Lifestyle, which was founded in November 2007 by former Apple employees, and covers Apple-related news, rumors, and lifestyle information. During the one-time only broadcast, viewers will be able to chat with each other in real time. The film will air at 9:30PM ET / 6:30 PM PT Monday, April 21, following TDL Live. "We're really excited to be able to show this film," said Ryan Ritchey, creator of The Digital Lifestyle. "This is a perfect example of moving beyond simply reporting the latest Apple news, and covering more of the Apple 'lifestyle' and the characters who are part of it," Ritchey said. Feiss rose to stardom after her "Switcher" ad aired in 2002. She turned down appearances on The Tonight Show and The Late Show with David Letterman in order to lead a normal teenager's life. Powered by Mogulus, The Digital Lifestyle is a 24-hour network of Apple-related video, that includes "TDL Live," a weekly live look at Apple news and rumors. "Bed & Breakfast" will air immediately after TDL Live. TheDigitalLifestyle: http://www.theDigitalLifestyle.tv More Information: http://www.thedigitallifestyle.tv/2008/04/were-broadcasting-ellen-feiss-film-on.html TheDigitalLifestyle.tv was founded in November 2007 as the only 24-hour online video network dedicated to Apple news, rumors, and lifestyle. The network was created by former Apple employees who bring a unique perspective to current Apple news and rumors. ### Ryan Ritchey Producer ryan ( -at -) thedigitallifestyle.tv ******* ******* *******
-
Cynical Peak Software releases Rivet 1.0 - Published on 04/16/08 Cynical Peak Software is pleased to announce the release of Rivet 1.0. Rivet enables users to stream video, music, and photos from Mac OS X to an Xbox 360 over your home network. You can now easily enjoy all of your media on your big screen TV from the comfort of your living room. Scottsdale, Arizona - Cynical Peak Software is pleased to announce the release of Rivet 1.0, their application for streaming video, music, and photos from Mac OS X to an Xbox 360. Rivet is an easy to use and fun way to play all of your favorite media content from your Mac on your TV using your Xbox 360, including movies, TV shows, music, photos, and podcasts. You can now easily enjoy all of your media on your big screen TV from the comfort of your living room. Rivet enables everyone to quickly browse and view their entire collection of digital media from from anywhere in the house on their Xbox 360. Your Mac's folder structure and organization is completely reproduced to allow you to quickly find exactly what you want to view. Navigation is now a breeze. You no longer have to search through a long list to find what you want. Dig in and start watching right away. Feature Highlights: * Music streaming of your iTunes library. * Photo streaming of your iPhoto library and user defined folders. * Video streaming from user defines folders. * Full organization support, your mac is recreated on the Xbox 360. * Quick automatic up[censored] on the Xbox 360 when files are added, deleted, or moved. System Requirements: * Requires Mac OS X v10.5 or later. * iTunes for music sharing * A networked Xbox 360 * 2.7 MB Hard Drive space. Pricing and Availability: Rivet 1.0 may be purchased for $18.95 USD and comes with a limited streaming demonstration period. Cynical Peak Software: http://cynicalpeak.com Rivet 1.0: http://cynicalpeak.com/rivet/ Direct Download Link: http://cynicalpeak.com/downloads/Rivet.zip Purchase Link: http://cynicalpeak.com/rivet/purchase.php Screenshot: http://cynicalpeak.com/rivet/imgs/mini_windows.png Screenshot/App Icon: http://cynicalpeak.com/images/rivet.png Headquartered in in Scottsdale, Arizona, Cynical Peak Software, LLC was founded in 2003 by President and CEO, Brad Miller, with a focus on bringing high quality software to the Macintosh platform. Copyright 2003 - 2008 Cynical Peak Software, LLC. All Rights Reserved. Apple, the Apple logo, are registered trademarks of Apple Computer in the U.S. and/or other countries. ### Brad Miller President 928-237-1901 brad ( -at -) cynicalpeak.com ******* Member wishes to have this product reviewed by the media *******
-
Hello, Please consider the following press release for inclusion on your site. Thank you very much. Regards, Sharon Smith linuxpr ( -at -) yahoo.com MindTouch Reports Outstanding Growth, Increased Momentum in the Social Enterprise Marketplace MindTouch primed to accelerate market expansion as it achieves segment leading customer growth and market successes Santa Clara and San Diego, CA, April 16, 2008 - MindTouch, the company behind the most sophisticated wiki available today is delivering the most full-featured application platform. MindTouch Deki Wiki, which empowers everyday users to create real-time reports and integrate systems quickly, while preserving IT governance, has set major new benchmarks for company growth in the most recent calendar quarter ending March 31. This quarter was MindTouch's largest ever with respect to sales, revenue, and enterprise deployments – and is the fifth consecutive quarter of increasing sales. MindTouch is showcasing Deki Wiki this week at the MySQL Conference and Expo in the DotOrg Pavilion, which is located in the Expo Hall. Impressive Corporate Growth In less than two years, MindTouch has gained mass global adoption in several enterprise market segments from media publishers, software, CE, online businesses, research/education institutions to U.S. government agencies and armed forces. With strong global partners and established commercial integrators in more than six countries MindTouch achieved significant increases in key corporate performance measures, including number of new clients added, enterprise deployments, resellers, and consumer downloads. Some of the impressive growth benchmarks include: Resellers in Germany, Spain, Sweden, Poland and Japan, - 400 percent increase Over 200,000 active installs - 100 percent increase Installs on all major Linux distributions – 600 percent increase More than 3,000 registered members at the developer community - 30 percent increase Translated into 16 languages - 500 percent increase MindTouch saw a rise in enterprise deployments across its portfolio of Fortune 500 industry clients. Representative clients include many industry leaders, such as: FedEx Fujitsu Siemens Microsoft Corporation Gannette U.S. Army Department of Defense U.S. Environmental Protection Agency City Of Los Angeles EMC Many industry analysts, including Gartner, have projected wikis will be used by more than half of the world's enterprises by the end of 2009. “MindTouch has emerged as the clear frontrunner in the social enterprise space. The alignment of market demand fit perfectly with our unparalleled product offerings," said Aaron Fulkerson MindTouch CEO and founder. "Our adoption rate and increase in enterprise deployments coupled with continued market expansion has set the stage for strong, sustained growth in 2008 and beyond." About MindTouch MindTouch, recognized the world over for innovation beyond open source wiki collaboration and content management to delivering a leading edge application integration and development platform. MindTouch Deki Wiki, built with a Web Oriented Architecture (WOA), enables users to connect teams, enterprise systems, Web services and Web 2.0 applications with IT governance. Users easily access and organize data and systems efficiently to achieve their business objectives. MindTouch Deki Wiki is deployed by Fortune 500 companies, major media, research/education institutions, government agencies, and online businesses worldwide. Customers include Microsoft, Fujitsu, Siemens, Gannette, FedEx, U.S. Army, DoD, and others. MindTouch is committed to delivering next generation solutions to people, businesses and governments. For more information about our company, people and innovations, visit http://mindtouch.com/ Media Contacts: Miiko Mentz, FutureWorks PR miiko(at)future-works(dot)com 408-858-7216 Adrienne Pierre adriennep(at)mindtouch(dot)com 619-795-8459 x1109 ____________________________________________________________________________________ Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ
-
Every time a new graphics card is released we hear great claims about how the new video enhancements will improve our viewing experience or that the hardware is as perfect as it can get in the High Definition HQV Benchmark. Unfortunately, for many reasons most end users have to pretty much accept these claims as it is not really possible for the average consumer to set up two identical systems, side by side and see what the differences are. Well we have with the aid of some spe[censored]t equipment and the results are fascinating, not only this but we have HD screen grabs and detailed analysis to show you which card delivers the best IQ........ http://www.driverheaven.net/reviews.php?reviewid=552 ___________________________________ Driver Heaven News Mailer
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Mapower MAP-KC31 eSATA & USB 2.0 HDD Link: http://www.techpowerup.com/reviews/Mapower/MAP_KC31 Brief: The Mapower KC31CSJ HDD enclosure has almost everything a user could ask for. The sturdy build quality is complimented by a sleek aluminum finish while remaining lightweight. The performance is pleasing especially compared to more expensive enclosures out there. The passively cooled heat dissipation system ensures silent operation while working hard to get that heat away from your important data.
-
EK Supreme and Koolance CPU-340 Compared to The Competition @ Madshrimps
news posted a topic in Upcoming News
Hello, EK Supreme and Koolance CPU-340 Compared to The Competition "Today we add two new blocks to our previous roundup, newcomer EK Supreme out of Slovenia and Koolance replacement to their CPU-330 the CPU-340." http://www.madshrimps.be/gotoartik.php?articID=810 __________________ Thank you in advance for posting,