Detecting Intruders Intro Looking for signs of a network attackApr 01, 2007
If you think your systems are too obscure for an attacker to worry about, think again. Today’s intruders are happy for any victim.more »
Blocking Spam Intro Facing down the masterminds of unsolicited Internet mailMar 01, 2007
Spammers charge real money for their dubious services, and hundreds of advertisers are willing to pay. We’ll show you some innovative techniques for controlling and containing spam, including strategies for slowing down spam bots, keeping spammers from getting your address, and separating spam from legitimate email.more »
Commercial Mail Servers Testing the Axigen, Kerio, and Merak commercial mail serversDec 01, 2006
They run on Red Hat Enterprise Linux, cost money, and juggle email messages: these three commercial mail servers aim to convince admins they are worth the price.more »
Charly's Column The Sysadmin’s Daily Grind: ZsyncNov 01, 2006
Zsync handles a special case: large volume download files that change frequently but not drastically. Charly shows how this handy file fetcher can save you time and bandwidth.more »
BOINC Building distributed applications with BOINCOct 01, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
Debian Hotplug Extending hotplug on Debian, SLES 9, and RHAS 4Oct 01, 2006
Debian hotplug is designed for little more than loading drivers and configuring devices. The collection of scripts discussed in this article helps Linux to respond when a network cable is plugged in or when a cellphone is in the vicinity. Read on for more on how to define custom hotplug events.more »
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.