Archiving Email Techniques for archiving emailJun 29, 2010
Email archiving involves more than just backing up your email directories. It is also a question of classifying the email and making it easier for users to find their way around overfilled email folders.more »
Remote Sys Admin Sys admin on the goJun 29, 2010
Keep track of your job when you’re not in the office.more »
PowerShell for AD Managing Active Directory at the command lineJun 29, 2010
Professionally manage Active Directory users, groups, and other AD objects with Windows PowerShell Version 2.0.more »
Community Notebook Free Software ProjectsJun 28, 2010
The Gramps genealogy program takes Linux fans on a tour of their family trees and helps evaluate data connected to ancestors. Puppet helps administrators automate regularly occurring tasks.more »
Logfile Viewers Logfile viewers for the desktop and shellMay 24, 2010
While users are surfing the web, listening to music, and writing documents, the kernel and various background daemons write information to logfiles. KSystemLog, Gnome System Log Viewer, and MultiTail will help you read and process logfile data.more »
The IT Service management module of the Open Ticket Request System (OTRS) adopts another ITIL process in version 2.0: change management.more »
The Red Hat distro extended its subscriptions with the choice of Linux running on the local server or from the Amazon cloud.more »
DATA STORAGE INTRO Studies in Linux data storageApr 26, 2010
This month we look at filesystems for SSDs and show you how to get connected with a Windows Active Directory file server.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.