Admin Workshop: Backups Insider Tips: BackupsMay 01, 2005
Data always seems to get lost at exactly the wrong moment, but the right backup strategy can help you restore those missing files.more »
Virtual Systems Intro Tools for virtual computing in LinuxMay 01, 2005
Windows apps with Wine Wine, Crossover Office, and CedegaMay 01, 2005
If you need to make a Windows application run on Linux, there is no better way than Wine. We investigated the free and commercial Wine variants to see how they bear up under real-life conditions.more »
Radius and 802.1X Securing Network Access with 802.1X, Radius, and LDAPMar 01, 2005
The Radius protocol is typically used to authenticate users in dial-up scenarios. But Radius is also useful in LAN environments: in combination with 802.1X, Radius forces users to authenticate at a low level before the switch opens up a port.more »
SpamAssassin A Home-Grown Spam FilterMar 01, 2005
Even if you do not have a mail server of your own, SpamAssassin can help you filter out unsolicited junk mail. This article describes how SpamAssassin collaborates with Evolution and KMail. Thunderbird, on the other hand, has its own simple spam-detection feature.more »
Admin Workshop:L ocks Insider Tips: LocksJan 01, 2005
A genuine multitasking system like Linux runs many processes concurrently. Programs must compete for data access. Assigning locks to files ensures exclusive access and prevents the possibility of data.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.