Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
libguestfs 1.8.0, a library and tool set for virtual machine (VM) disk image management.more »
Google announced that Chrome is ready for business and the wait to deploy Chrome and Google Apps for Business is over.more »
To celebrate the new look of and solicit user feedback on their commercially offered Ubuntu Advantage Program, Canonical is offering a free 30-day trial version of Landscape.more »
Letters Write AccessNov 23, 2010
Dear Rikki Kite: I picked up a copy of Linux Magazine the other day and read your most current, interesting article. Since you welcomed ideas for topics, I have a topic that never seems to be addressed.more »
Centrify Express now available through the Ubuntu Software Partner Repository.more »
The bug was introduced back in 2009 and has been lurking around all this time.
The new release deprecates the sshd_config UsePrivilegeSeparation option.
Lives on as a community project
Five new systems join Dell XPS 13 Developer Edition that come with Ubuntu pre-installed.
The Skype Linux client now has almost the same capabilities that it enjoys on other platforms.
At CeBIT 2017, OpenStack Day will offer a wide range of lectures and discussions.
A major setback for the Linux desktop.
Improved support for GPU in virtualization.
News site for the openSUSE community falls victim to a Wordpress exploit.
The source code is available online.