Network Block Devices A new mission for the network block deviceAug 31, 2006
You don’t need Samba or NFS to support a diskless client. A remote block device can help improve performance and efficiency. We'll show your how.more »
Bot_Attack An insidious spam botnet attacks CharlyJul 31, 2006
While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.more »
Charly's Column The Sysadmin’s Daily Grind: DnsgraphJul 31, 2006
A partly overloaded DNS server can slow down all the workstations on the network. Dnsgraph is an early warning system that gives administrators a graph of critical values. Your Dnsgraph charts will help you keep your systems serving names.more »
Antsp2p Anonymous Filesharing with Antsp2pMay 31, 2006
Filesharing is a favorite leisure activity for many Internet users. But conventional filesharing tools have one major drawback – they aren’t anonymous. The Antsp2p project aims to change this.more »
Charly's Column The Sysadmin’s Daily Grind: Nmap 4Apr 30, 2006
Many tools keep growing with each new version, but Nmap 4.00 has lost weight thanks to the Diet-Nmap project. The latest incarnation of Nmap is not only quicker, it is also more frugal with memory.more »
Charly's Column The Sysadmin’s Daily Grind: Webalizer XtendedFeb 28, 2006
Webalizer is a tool for analyzing web server logfiles. A new patch lets admins see what isn’t there.more »
Twisted Creating network apps with TwistedFeb 28, 2006
The Twisted framework makes it so easy to create network-aware applications in Python. Twisted speaks all the major Internet protocols, from mail through chat, and it can handle encryption. We’ll show you how to set up a personal web server with Twisted.more »
Asterisk Telephony with an Asterisk phone systemJan 31, 2006
An old computer is all you need to build your own do-it-yourself personal phone server.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.