Ubuntu founder denounces insecurity in proprietary, close-source software blobs.more »
Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Android Admin Tools Linux Remote Administration on Android and iOSJan 14, 2014
Smartphones and tablets have lost their gadget status and become part of the system administrator’s tool kit. We look at the most important apps for admins.more »
Fixing Disks with Parted Magic Disk AidDec 03, 2013
It’s really annoying when a disk suddenly dies on you or a typo in a command deletes important data. The free Parted Magic Live distro offers help.more »
The One-Watt Server Home Router as a Mini-ServerAug 22, 2013
Many devices now run Linux – but mostly as closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.more »
Reimagining the Virtual Desktop Final TermJul 30, 2013
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.more »
Getting System Info with I-Nex InventoryJul 15, 2013
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.more »
Consolidating Logs with Logstash Collect and Analyze System Data from a Single InterfaceJun 18, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.