Remote Control Controlling PCs with an Android smartphoneJun 19, 2012
Did you leave your system running? Did you forget to start a critical backup? Control your Linux computer from anywhere with an Android phone.more »
Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.more »
Security Lessons: cgroups and LXC Fleet and flexible cgroups and Linux ContainersAug 03, 2011
The big virtualization tools like KVM and Xen can’t compete on a small scale with resource-spare cgroups and Linux Containers.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Supermicro announces its SSE-X24S, a new high-performance, 10Gb Ethernet switch.more »
PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Charly's Column: tcpflow and HugeURL tcpflow and HugeURLApr 29, 2011
First the fun, then the pleasure: This month, we look at a TCP that administrators have to take seriously, followed by some URL fun.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.