Virtual Admin Tools for managing virtual environmentsDec 31, 2008
This month we examine techniques for deploying and managing virtual systems.more »
PHP The EXPERT’s VOIce® in Open Source PHP Objects, Patterns, and Practice Chapter 2: PHP and ObjectsDec 21, 2008
Objects were not always a key part of the PHP project. In fact, they have been described as an afterthought by PHP’s designers. As afterthoughts go, this one has proved remarkably resilient. In this chapter, I introduce coverage
of objects by summarizing the development of PHP’s object-oriented features.
The TangoCMS project has released version 2.2.0 of its web page content management system. Central to the release is resolving some security issues.more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn.more »
Seamless Integration Intro Expert techniques for living with WindowsNov 30, 2008
Yes, you can do that with Linux… Even if you want to live in an open source world, it's still full of Windows. This month we study strategies for Windows integration.more »
Top Ten Tops We pick the top ten Top toolsNov 30, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
Security Lessons (Almost) undetectable hardware-based rootkitsNov 30, 2008
We look at the history of the rootkit, including its newest incarnation, the DR RootKit.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm