Remote Control Controlling PCs with an Android smartphoneJun 19, 2012
Did you leave your system running? Did you forget to start a critical backup? Control your Linux computer from anywhere with an Android phone.more »
Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.more »
Security Lessons: cgroups and LXC Fleet and flexible cgroups and Linux ContainersAug 03, 2011
The big virtualization tools like KVM and Xen can’t compete on a small scale with resource-spare cgroups and Linux Containers.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Supermicro announces its SSE-X24S, a new high-performance, 10Gb Ethernet switch.more »
PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Charly's Column: tcpflow and HugeURL tcpflow and HugeURLApr 29, 2011
First the fun, then the pleasure: This month, we look at a TCP that administrators have to take seriously, followed by some URL fun.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives