Router as a Mini-Server Pimp your TL-MR3020 mobile routerMay 31, 2013
Many devices now run Linux – but mostly as a closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.more »
What’s New in Samba 4 Samba 4May 06, 2013
In December 2012, the open source world received the first, and very long awaited, release of the Samba 4.x series.more »
Logstash Centralized log archiving with LogstashApr 30, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Apache HTTP Server 2.4 What’s new in Apache HTTP Server, version 2.4Feb 22, 2013
Apache HTTP Server version 2.4 is full of exciting new features. We share a few of them with you.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
Workspace: Raspberry Pi Server Raspberry Pi server tools and applicationsNov 26, 2012
With the help of the applications we describe, Raspberry Pi can perform a wide range of server duties.more »
Linux Small Business Server Distros Linux Small Business DistrosNov 05, 2012
Admins of small businesses who want to cover all their infrastructure requirements with a single server are the target group of small business servers. In this article, we introduce three Linux distributions that meet this requirement.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.