Data Rescue LifebuoyFeb 24, 2014
Armed only with standard Linux tools, users can recover files, resurrect partitions, and rescue damaged media.more »
Consolidating Logs with Logstash Collect and Analyze System Data from a Single InterfaceJun 18, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Resetting Passwords with SystemRescueCd Resetting passwords with a Live Linux systemJun 21, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
UEFI and Secure Boot No Free BootsJun 20, 2012
The imminent Windows 8 implementation of UEFI with Secure Boot adds an extra layer of complexity for some Linux users. We look at the problem and two solutions from Fedora and Canonical.more »
Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.more »
Qemu and the Kernel DebuggerFeb 23, 2012
Debugging the kernel of a running operating system has always been tricky, but now the Qemu emulator supports cross-platform kernel and module debugging at the programming language level.more »
Debugging for Admins Problem-solving best practices for sys adminsFeb 21, 2012
Whether you’re the sys admin of a home network or of a company-wide network of dozens or even hundreds of machines, some basic principles of debugging will come in handy.more »
TestDisk and its cousin PhotoRec will help you recover the data you thought you’d lost.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems