Remote Control Controlling PCs with an Android smartphoneJun 19, 2012
Did you leave your system running? Did you forget to start a critical backup? Control your Linux computer from anywhere with an Android phone.more »
Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.more »
Security Lessons: cgroups and LXC Fleet and flexible cgroups and Linux ContainersAug 03, 2011
The big virtualization tools like KVM and Xen can’t compete on a small scale with resource-spare cgroups and Linux Containers.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Supermicro announces its SSE-X24S, a new high-performance, 10Gb Ethernet switch.more »
PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Charly's Column: tcpflow and HugeURL tcpflow and HugeURLApr 29, 2011
First the fun, then the pleasure: This month, we look at a TCP that administrators have to take seriously, followed by some URL fun.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.