Udev Dynamic device management in UdevSep 30, 2006
After three years of hanging around on the sidelines, Udev has finally ousted the legacy Dev-FS system. We take a look under the hood at the Udev device management system inside your Linux system.more »
KTools: Klik Software distribution with KlikFeb 28, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
Admin Workshop: Documentation Insider Tips: Documentation in Unix and LinuxJul 31, 2005
System admins routinely refer to documentation for help with obscure command line options. In this month’s Admin Workshop, we examine the programs and formats behind the command line documentation you read everyday.more »
Admin Workshop: User Management Managing Linux User AccountsJun 30, 2005
The steps for setting up new accounts in Linux are automated and often use GUI-based tools. Under the hood, a number of mechanisms give the new user an environment to match his or her needs. In this month’s Admin Workshop we discuss techniques for setting up accounts.more »
Admin Workshop: inetd & xinetd Insider Tips: Server Management with inetd and xinetdFeb 28, 2005
If you have many daemons running on your server, it can be quite difficult to keep track of them all. inetd and xinetd manage these services centrally and also take care of exchanges with your clients, allowing programs without network code to operate as Internet servers.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm