Fedora 9 DVD
Fedora's advanced security features are evidence of its Red Hat parentage. You'll find support for the SELinux mandatory access control system, as well as execution control features such as No eXecute and Position Independent Executables (PIE). Also inside Fedora 9 is support for ELF data hardening, buffer overflow detection, and restricted kernel memory access. The firewall management tool bundled with Fedora 9 offers easy and convenient firewall configuration from the desktop.
Fedora 9 provides a rich feature base, simplified administration, and advanced security for the server room or desktop. The operating system is solid, robust, and compatible with almost any desktop environment.
We hope you enjoy this month's Fedora 9 DVD.
If you are a subscriber or a newsstand buyer in the UK, you'll notice that the DVD is now bound into the magazine instead of being supplied in a separate plastic case. In line with our Green IT theme this month, we have decided to stop using the plastic cases as a way to reduce the environmental impact of our product. When you're done with your DVD, please recycle it, or better yet, consider giving it to a friend or colleague for reuse.
Processor: Pentium class; Graphics mode, 400Mhz or better; Text mode, 200 Mhz or better.
Memory: Graphics mode, 192 MB min/256 MB recommended; Text mode: 128 MB min.
Hard Disk: The necessary disk space varies depending on configuration and installation options.
Help & Support
The Fedora Project website has a helpful installation guide and desktop user guide: http://docs.fedoraproject.org/.
You might also wish to check out the Fedora FAQ: http://fedoraproject.org/wiki/FAQ
Community help is available through the Fedora forum: http://fedoraforum.org/
Linux Kernel 2.6.25
 Fedora 9 Release Notes: http://docs.fedoraproject.org/release-notes/f9/en_US/
 Fedora 9 Installation Guide: http://docs.fedoraproject.org/install-guide/f9/en_US/
Buy this article as PDF
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.