Ubuntu founder denounces insecurity in proprietary, close-source software blobs.more »
Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Android Admin Tools Linux Remote Administration on Android and iOSJan 14, 2014
Smartphones and tablets have lost their gadget status and become part of the system administrator’s tool kit. We look at the most important apps for admins.more »
Fixing Disks with Parted Magic Disk AidDec 03, 2013
It’s really annoying when a disk suddenly dies on you or a typo in a command deletes important data. The free Parted Magic Live distro offers help.more »
The One-Watt Server Home Router as a Mini-ServerAug 22, 2013
Many devices now run Linux – but mostly as closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.more »
Reimagining the Virtual Desktop Final TermJul 30, 2013
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.more »
Getting System Info with I-Nex InventoryJul 15, 2013
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.more »
Consolidating Logs with Logstash Collect and Analyze System Data from a Single InterfaceJun 18, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm