VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.more »
New cloud combines worldwide access with local attention to data security.more »
Qubes OS Exploring the Qubes OS secure operating systemJan 27, 2014
Most operating systems claim to be secure; however, most fail terribly. Newcomer Qubes OS tries a different approach, relying on a microkernel and pervasive virtualization.more »
MediaGoblin Set up your own media-sharing site with MediaGoblinOct 07, 2013
The same way that “ease of use” usually equates to less flexibility, “convenience” is nearly always synonymous with less privacy. And, YouTube nowadays is very, very convenient, if you catch my drift. So, if you just want to share a video and not all of your personal data, or you want to avoid rude users from commenting on your kids’ videos, MediaGoblin is what you need.more »
New features in SUSE Studio 1.3 include enhanced cloud integration, VM platform support, and lifecycle management.more »
VMware Monitoring VMware monitoring with OpenNMSMar 15, 2013
Dynamic resource allocation and migration of virtual machines between hosts mean that VMware environments pose new monitoring challenges. A new version of the free OpenNMS network management tool now includes an option for monitoring VMware-based infrastructures.more »
Proxmox VE Virtualization with the Proxmox Virtual Environment 2.2Mar 15, 2013
The Proxmox Virtual Environment has developed from an insider’s tip to a free VMware ESXi/ vSphere clone. We show you how to get started setting up a PVE high-availability cluster.more »
Command Line – Probing /proc Understanding the transitory /proc filesystemMar 15, 2013
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm