Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
libguestfs 1.8.0, a library and tool set for virtual machine (VM) disk image management.more »
Google announced that Chrome is ready for business and the wait to deploy Chrome and Google Apps for Business is over.more »
To celebrate the new look of and solicit user feedback on their commercially offered Ubuntu Advantage Program, Canonical is offering a free 30-day trial version of Landscape.more »
Letters Write AccessNov 23, 2010
Dear Rikki Kite: I picked up a copy of Linux Magazine the other day and read your most current, interesting article. Since you welcomed ideas for topics, I have a topic that never seems to be addressed.more »
Centrify Express now available through the Ubuntu Software Partner Repository.more »
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.