Open source Marionette Project becomes part of Puppet.more »
Charly's Column: GestióIP The sys admin’s daily grind: GestióIPSep 29, 2010
A tidy house, a tidy mind they say, and I’ll leave it up to you to consider what being disorganized might mean. Anybody who has tried to manage hundreds of IP addresses using just a sheet of paper or a spreadsheet will probably appreciate some help.more »
Beginners: File Control Getting to grips with Linux PermissionsSep 27, 2010
From the vault:This article first appeared in issue #1 (October 2000). You'll also find this article on our 10-year anniversary Archive DVD included in issue #120 (November 2010).
With any operating system it is important to ensure that users remain in control of their files and directories and are prevented from tampering with those belonging to other users, or the system. This is what the Linux permissions system is all about, as Jono Bacon explains.more »
Move replaces Windows Live Spaces, adds 7 million users to WordPress.more »
Federal Communications Commission follows The White House's lead.more »
Drupal announces what they hope to be the final alpha build of version 7.x.more »
Charly's Column: My Traceroute Sysadmin's daily grindAug 31, 2010
Charly takes the name of the “My Traceroute” tool very literally. The journey is the reward for this alternative TTL-measuring utility.more »
'Crane' allows MySQL data integration in Hadoop.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm