Fedora 9 DVD
Fedora's advanced security features are evidence of its Red Hat parentage. You'll find support for the SELinux mandatory access control system, as well as execution control features such as No eXecute and Position Independent Executables (PIE). Also inside Fedora 9 is support for ELF data hardening, buffer overflow detection, and restricted kernel memory access. The firewall management tool bundled with Fedora 9 offers easy and convenient firewall configuration from the desktop.
Fedora 9 provides a rich feature base, simplified administration, and advanced security for the server room or desktop. The operating system is solid, robust, and compatible with almost any desktop environment.
We hope you enjoy this month's Fedora 9 DVD.
If you are a subscriber or a newsstand buyer in the UK, you'll notice that the DVD is now bound into the magazine instead of being supplied in a separate plastic case. In line with our Green IT theme this month, we have decided to stop using the plastic cases as a way to reduce the environmental impact of our product. When you're done with your DVD, please recycle it, or better yet, consider giving it to a friend or colleague for reuse.
Processor: Pentium class; Graphics mode, 400Mhz or better; Text mode, 200 Mhz or better.
Memory: Graphics mode, 192 MB min/256 MB recommended; Text mode: 128 MB min.
Hard Disk: The necessary disk space varies depending on configuration and installation options.
Help & Support
The Fedora Project website has a helpful installation guide and desktop user guide: http://docs.fedoraproject.org/.
You might also wish to check out the Fedora FAQ: http://fedoraproject.org/wiki/FAQ
Community help is available through the Fedora forum: http://fedoraforum.org/
Linux Kernel 2.6.25
 Fedora 9 Release Notes: http://docs.fedoraproject.org/release-notes/f9/en_US/
 Fedora 9 Installation Guide: http://docs.fedoraproject.org/install-guide/f9/en_US/
Buy this article as PDF
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.