Today, Canonical and Autonomic Resources announce the availability of an integrated product based on Ubuntu Enterprise Cloud (UEC) and Dell Blade server hardware under the ARC-P cloud product family.more »
Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
"Cobbler now in the ubuntu archive...and it actually works!," said Robbie Williamson, Ubuntu Server Team Manager at Canonical.more »
JBoss AS 6.0, a free Java EE 6 compliant application server, is now available.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
"For the FreeBSD community as a whole, I think it comes down to the fact that Amazon Web Services is the market leader -- other clouds each have their own advantages, but EC2 is the default first place to look." -- Colin Percivalmore »
Charly's Column: GestióIP The sys admin’s daily grind: GestióIPSep 29, 2010
A tidy house, a tidy mind they say, and I’ll leave it up to you to consider what being disorganized might mean. Anybody who has tried to manage hundreds of IP addresses using just a sheet of paper or a spreadsheet will probably appreciate some help.more »
Beginners: File Control Getting to grips with Linux PermissionsSep 27, 2010
From the vault:This article first appeared in issue #1 (October 2000). You'll also find this article on our 10-year anniversary Archive DVD included in issue #120 (November 2010).
With any operating system it is important to ensure that users remain in control of their files and directories and are prevented from tampering with those belonging to other users, or the system. This is what the Linux permissions system is all about, as Jono Bacon explains.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems