Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine. commore »
Charly's Column The sys admin’s daily grind: DeborphanJul 07, 2008
Debian fans appreciate the ability to update their systems to a new release without having to reinstall. The Deborphan tool takes care of the victims of the upgrade by searching for orphaned packages on which no other packages depend.more »
Cute Flow Document circulation with CuteFlowJun 20, 2008
The CuteFlow document circulation system supports cross-platform document exchanges. CuteFlow is easy to install and configure but still has a couple of weak areas.more »
ReMoot Activating your multimedia keys with ReMootJun 20, 2008
If your laptop multimedia keys aren’t working in Linux, the fix could be easier than you think. We’ll show you how to manage multimedia applications from the keyboard using ReMoot.more »
The Parted Magic Linux Live System gives users the ability to manipulate hard disk partitions in various formats. Version 2.0 is the first to rely on the Visparted GUI tool .more »
Linspire is offering commercial support for basic issues for its Freespire community version as of now.more »
How to Write a Rootkit Rootkits for the Linux kernel 2.6Jul 31, 2006
Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm