Today, Canonical and Autonomic Resources announce the availability of an integrated product based on Ubuntu Enterprise Cloud (UEC) and Dell Blade server hardware under the ARC-P cloud product family.more »
Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
"Cobbler now in the ubuntu archive...and it actually works!," said Robbie Williamson, Ubuntu Server Team Manager at Canonical.more »
JBoss AS 6.0, a free Java EE 6 compliant application server, is now available.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
"For the FreeBSD community as a whole, I think it comes down to the fact that Amazon Web Services is the market leader -- other clouds each have their own advantages, but EC2 is the default first place to look." -- Colin Percivalmore »
Charly's Column: GestióIP The sys admin’s daily grind: GestióIPSep 29, 2010
A tidy house, a tidy mind they say, and I’ll leave it up to you to consider what being disorganized might mean. Anybody who has tried to manage hundreds of IP addresses using just a sheet of paper or a spreadsheet will probably appreciate some help.more »
Beginners: File Control Getting to grips with Linux PermissionsSep 27, 2010
From the vault:This article first appeared in issue #1 (October 2000). You'll also find this article on our 10-year anniversary Archive DVD included in issue #120 (November 2010).
With any operating system it is important to ensure that users remain in control of their files and directories and are prevented from tampering with those belonging to other users, or the system. This is what the Linux permissions system is all about, as Jono Bacon explains.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.