It’s on everyone’s lips: the Swiss CERN’s 3-billion-Euro Large Hadron Collider(LHC) research project. Scientific Linux is part of it.more »
CLUSTERIP Load balancing and high-availability clusters with iptablesJul 02, 2008
Iptables gives admins the ability to set up clusters and distribute the load. But what about failover?more »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine. commore »
OpenSSI Building high-performance clusters with OpenSSIJun 30, 2008
The OpenSSI framework rearranges processes for easy and transparent clustering.more »
Remote Terminal Service with NX Lean terminal services with NXJun 20, 2008
NX provides fast terminal services, even over slow connections.more »
Remote Access with VNC Remote GUI access with VNCJun 20, 2008
Once you only needed a command line to access remote computers, but today’s networks sometimes require a graphical connection. The VNC protocol provides a practical cross-platform screen sharing solution. We’ll take a close look at VNC and show you some leading no-cost VNC applications.more »
Sun Microsystems has released the first few components of Solaris Cluster Express 7/07 as Open Source.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm