Sudo and PolicyKit Assigning privileges with sudo and PolicyKitNov 26, 2012
If you give users who are usually supervised more scope to help themselves, they will need additional privileges. The sudo tool and the PolicyKit authorization service can control who does what on Linux.more »
WebIssues Tool Issue tracking and collaboration with WebIssuesNov 26, 2012
The WebIssues tool offers more than just bug tracking; it can help you manage complex multiuser projects as well.more »
Git 101 Not just for source code – Versioning with GitNov 26, 2012
When several people collaborate on source code or documents, things can get messy fast. Git provides a quick cure: The distributed versioning system reliably ensures the integrity and consistency of data with minimal effort.more »
Script Dialogs Automating tasks with SSH, Zenity, Yad, KDialog, PuTTY, WinSCP, and Rex Secure AgentNov 26, 2012
Starting a script on a Linux server with just a few mouse clicks sounds more complicated than it really is. If you want to create attractive and interactive dialogs for your desktop users, all you need is a small utility called SSH and a little Bash know-how.more »
When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Cloning Hard Disks Four tools for cloning hard disksJul 24, 2012
Is your hard disk making strange noises? Do you intend to make some major hardware changes? Maybe it’s high time to clone your disk. Four tools help Linux users and system administrators move their data and create one-to-one copies.more »
SSH with PAC Controlling SSH sessions with PACJul 24, 2012
PAC, with its convenient graphical connection manager, is a Linux application that manages SSH and other connections. The tool supports macros and lets users send commands to an entire cluster of servers simultaneously.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm