Udev Dynamic device management in UdevOct 01, 2006
After three years of hanging around on the sidelines, Udev has finally ousted the legacy Dev-FS system. We take a look under the hood at the Udev device management system inside your Linux system.more »
KTools: Klik Software distribution with KlikMar 01, 2006
Klik brings convenient two-click installation to the KDE desktop.more »
Admin Workshop: Documentation Insider Tips: Documentation in Unix and LinuxAug 01, 2005
System admins routinely refer to documentation for help with obscure command line options. In this month’s Admin Workshop, we examine the programs and formats behind the command line documentation you read everyday.more »
Admin Workshop: User Management Managing Linux User AccountsJul 01, 2005
The steps for setting up new accounts in Linux are automated and often use GUI-based tools. Under the hood, a number of mechanisms give the new user an environment to match his or her needs. In this month’s Admin Workshop we discuss techniques for setting up accounts.more »
Admin Workshop: inetd & xinetd Insider Tips: Server Management with inetd and xinetdMar 01, 2005
If you have many daemons running on your server, it can be quite difficult to keep track of them all. inetd and xinetd manage these services centrally and also take care of exchanges with your clients, allowing programs without network code to operate as Internet servers.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.