KEY EXPERIENCE The sys admin's daily grind: Single-packet authenticationAug 26, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Remote Terminal Service with NX Lean terminal services with NXJun 20, 2008
NX provides fast terminal services, even over slow connections.more »
Rdesktop Windows terminal services in Linux with RdesktopJun 20, 2008
Windows terminal services in Linux with Rdesktopmore »
AuFS Configuring the AuFS filesystem for terminal clientsJun 19, 2008
AuFS offers a painless filesystem for a thin client, and FS-Cache provides a persistent cache.more »
Sun Microsystems has now released a management solution following its Xen-based virtualization solution, XVM.more »
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
Setting Up a Quake Server Configuring a Quake3 Arena serverSep 26, 2007
You don’t have to be an expert to set up your own Quake 3 game server.more »
Version 3.00 of the free logfile analyzer W3Perl has just been released, and includes a number of enhancements. Among other features, the program now supports weekly and monthly statistics with the same granularity as daily reports, and can email the results if needed.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.