Version 4.0.0 of System Imager, a software for automating the installation of Linux computers and for software distribution has just been released.more »
Hewlett-Packard has now completed the acquisition of Neoware. The thin client computing and virtualization solution provider will add value to HP's Linux portfolio.more »
Linuxconf Europe 2007 kicked off this Sunday in Cambridge, UK. Unix user groups from Great Britain and other parts of Europe will be hosting lectures and workshops until September 5.more »
Charly's Column The Sysadmin’s Daily Grind: ZsyncOct 31, 2006
Zsync handles a special case: large volume download files that change frequently but not drastically. Charly shows how this handy file fetcher can save you time and bandwidth.more »
BOINC Building distributed applications with BOINCSep 30, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
Debian Hotplug Extending hotplug on Debian, SLES 9, and RHAS 4Sep 30, 2006
Debian hotplug is designed for little more than loading drivers and configuring devices. The collection of scripts discussed in this article helps Linux to respond when a network cable is plugged in or when a cellphone is in the vicinity. Read on for more on how to define custom hotplug events.more »
Hotplug Hacks Intro Extending the Linux hotplug systemSep 30, 2006
Hotplugging is invisible and automatic – if you want it to be. But a close look at the Linux hotplug system reveals interesting opportunities for customization.more »
Sabayon and Pessulus Dedicated Gnome desktops with Pessulus and SabayonAug 31, 2006
Gnome version 2.14 includes new features for restricting the user’s access to the system. The Pessulus lockdown editor and the Sabayon profile editor help manage the Gnome user experience.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm