TeamViewer v8.0 offers new features for easier remote administration.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
Security Lessons: OpenSSH VPNs Building SSH VPNs with OpenSSHSep 21, 2012
OpenSSH VPN technology, installed by default on most Linux, BSD, and Unix systems, lets you mix and match different clients and servers easily.more »
Table of Contents: 142 Going VirtualJul 24, 2012
Your virtualization options continue to expand. This month, we look at two popular solutions. First, we show you how to map your virtual disks to optimize your KVM installation. Then, we examine the ins and outs of virtualization with VMware’s free vSphere Hypervisor 5.0.more »
Charly’s Column: OpenNetAdmin The sys admin’s daily grind: OpenNetAdminSep 23, 2011
Last month, the Havege daemon helped organize the chaos in this column. Today, Charly attempts to organize the network – a tale of suffering in three chapters.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm