Sudo and PolicyKit Assigning privileges with sudo and PolicyKitNov 26, 2012
If you give users who are usually supervised more scope to help themselves, they will need additional privileges. The sudo tool and the PolicyKit authorization service can control who does what on Linux.more »
WebIssues Tool Issue tracking and collaboration with WebIssuesNov 26, 2012
The WebIssues tool offers more than just bug tracking; it can help you manage complex multiuser projects as well.more »
Git 101 Not just for source code – Versioning with GitNov 26, 2012
When several people collaborate on source code or documents, things can get messy fast. Git provides a quick cure: The distributed versioning system reliably ensures the integrity and consistency of data with minimal effort.more »
Script Dialogs Automating tasks with SSH, Zenity, Yad, KDialog, PuTTY, WinSCP, and Rex Secure AgentNov 26, 2012
Starting a script on a Linux server with just a few mouse clicks sounds more complicated than it really is. If you want to create attractive and interactive dialogs for your desktop users, all you need is a small utility called SSH and a little Bash know-how.more »
When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Cloning Hard Disks Four tools for cloning hard disksJul 24, 2012
Is your hard disk making strange noises? Do you intend to make some major hardware changes? Maybe it’s high time to clone your disk. Four tools help Linux users and system administrators move their data and create one-to-one copies.more »
SSH with PAC Controlling SSH sessions with PACJul 24, 2012
PAC, with its convenient graphical connection manager, is a Linux application that manages SSH and other connections. The tool supports macros and lets users send commands to an entire cluster of servers simultaneously.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.