Table of Contents: 152 What's inside the July 2013 issueMay 20, 2013
We look at SharePoint integration and show you how to manage Active Directory from Linux. But first, a special story on a dangerous new class of intrusion tools.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
Security Lessons: OpenSSH VPNs Building SSH VPNs with OpenSSHSep 21, 2012
OpenSSH VPN technology, installed by default on most Linux, BSD, and Unix systems, lets you mix and match different clients and servers easily.more »
- Android gains market share
- VMware Workstation
- Perforce on Demand
- openSUSE 12.2 released
- CUDA 5 rc
- Web Foundation index measures world
- New Z shell release first since 2004
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
Are you ready for IPv6? Celebrate International Sysadmin Day with a free copy of the ADMIN IPv6 Special courtesy of Splunk and ADMIN Magazine.more »
SSH with PAC Controlling SSH sessions with PACJul 24, 2012
PAC, with its convenient graphical connection manager, is a Linux application that manages SSH and other connections. The tool supports macros and lets users send commands to an entire cluster of servers simultaneously.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm