According to Dice, the recession is over for software developers, system administrators, and other IT specialists.more »
Roll Your Own Arch with Archiso Rolling your own Arch-based Linux Live image with ArchisoJan 23, 2013
Build a custom Live boot image with Arch Linux and Archiso.more »
Coping with UEFI Coping with the UEFI boot processJan 23, 2013
The UEFI boot specification offers new capabilities – and new headaches – if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
ngrep: Network Grep Network grepJan 23, 2013
Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.more »
Partition Rescue Using SystemRescueCd to recover partition dataDec 19, 2012
If your Linux or Windows system won’t boot, or if you’re worried that the hard disk is on its last legs, the first thing you need to do is rescue the partition data and copy it to a safe location.more »
File Transport Transferring large filesDec 19, 2012
Various alternatives let you work around pesky size limits when transferring a file from point A to point B.more »
TCP Fast Open Network acceleration with TCP Fast OpenDec 19, 2012
With TCP Fast Open, Google introduces a protocol extension, implemented in the Linux kernel, that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending on the application.more »
Linux Rescue Keeping your computer safe with LinuxDec 19, 2012
When thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems