Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
libguestfs 1.8.0, a library and tool set for virtual machine (VM) disk image management.more »
Google announced that Chrome is ready for business and the wait to deploy Chrome and Google Apps for Business is over.more »
To celebrate the new look of and solicit user feedback on their commercially offered Ubuntu Advantage Program, Canonical is offering a free 30-day trial version of Landscape.more »
Letters Write AccessNov 23, 2010
Dear Rikki Kite: I picked up a copy of Linux Magazine the other day and read your most current, interesting article. Since you welcomed ideas for topics, I have a topic that never seems to be addressed.more »
Centrify Express now available through the Ubuntu Software Partner Repository.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.