Router as a Mini-Server Pimp your TL-MR3020 mobile routerMay 31, 2013
Many devices now run Linux – but mostly as a closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.more »
What’s New in Samba 4 Samba 4May 06, 2013
In December 2012, the open source world received the first, and very long awaited, release of the Samba 4.x series.more »
Logstash Centralized log archiving with LogstashApr 30, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Apache HTTP Server 2.4 What’s new in Apache HTTP Server, version 2.4Feb 22, 2013
Apache HTTP Server version 2.4 is full of exciting new features. We share a few of them with you.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
Workspace: Raspberry Pi Server Raspberry Pi server tools and applicationsNov 26, 2012
With the help of the applications we describe, Raspberry Pi can perform a wide range of server duties.more »
Linux Small Business Server Distros Linux Small Business DistrosNov 05, 2012
Admins of small businesses who want to cover all their infrastructure requirements with a single server are the target group of small business servers. In this article, we introduce three Linux distributions that meet this requirement.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm