Udev Dynamic device management in UdevSep 30, 2006
After three years of hanging around on the sidelines, Udev has finally ousted the legacy Dev-FS system. We take a look under the hood at the Udev device management system inside your Linux system.more »
KTools: Klik Software distribution with KlikFeb 28, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
Admin Workshop: Documentation Insider Tips: Documentation in Unix and LinuxJul 31, 2005
System admins routinely refer to documentation for help with obscure command line options. In this month’s Admin Workshop, we examine the programs and formats behind the command line documentation you read everyday.more »
Admin Workshop: User Management Managing Linux User AccountsJun 30, 2005
The steps for setting up new accounts in Linux are automated and often use GUI-based tools. Under the hood, a number of mechanisms give the new user an environment to match his or her needs. In this month’s Admin Workshop we discuss techniques for setting up accounts.more »
Admin Workshop: inetd & xinetd Insider Tips: Server Management with inetd and xinetdFeb 28, 2005
If you have many daemons running on your server, it can be quite difficult to keep track of them all. inetd and xinetd manage these services centrally and also take care of exchanges with your clients, allowing programs without network code to operate as Internet servers.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.