Remote Control Intro Remote control, screen sharing, and terminal service in LinuxOct 31, 2007
You can optimize your network by letting your systems share screen images, CPU cycles, and even mouse clicks. This month we look at remote control and terminal service technologies.more »
GCC 4.2 GNU Compiler Collection 4.2Aug 24, 2007
The latest GNU compiler provides better support for parallel programming, and GCC also rolls out some new optimization features. We took GCC 4.2 for a test drive.more »
Zeus Load Balancer Exploring the Linux-based Zeus load balancerJul 01, 2007
On today’s networks, distributing requests in a cluster of web servers requires more than just assigning the requests in a round robin. The Zeus ZXTM 7400 appliance demonstrates the technical finesse necessary to keep busy websites running.more »
D-Bus and HAL Interprocess communication with D-Bus and HALJul 01, 2006
It’s the end of the line for CORBA! Gnome now relies on the D-Bus messaging system, and KDE is in the process of migrating.more »
Root Password Window Customizing the password popup windowMay 01, 2006
We’ll show you some tricks for configuring the root password popup window on Red Hat-based systems.more »
AppArmor Hardening systems with AppArmorMay 01, 2006
After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.more »
Linux Tuning Intro Techniques for better performanceApr 01, 2006
Are your multimedia applications receiving the resources they need? Are you using the optimum filesystem for your environment? You don't have to be an expert to find better performance in Linux – you just need to know where to look.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.