Charly's Column The Sysadmin’s Daily Grind: ArpalertNov 30, 2006
Corporate policies prohibit the unauthorized connection of hardware to the company network, threatening dire consequences in the case of non-compliance. Fair enough, but how do you actually go about catching somebody trying to plug an illegal laptop into your Ethernet?more »
Crypto Tricks Intro Disk-level cryptography in LinuxOct 31, 2006
Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.more »
Charly's Column TUNNELING THE DUTCH BEACHESSep 30, 2006
What does Charly’s recent two-week vacation in Holland have in common with an SSH session? Nothing at all, at first sight. And therein lies a tale.more »
Perl: Link Spam A Perl script protects forums against spamSep 30, 2006
Spammers don’t just send email. They exploit discussion forums and blogs, posting pseudo-messages full of links to dupe search engines. A Perl script cleans up the mess.more »
Charly's Column The Sysadmin’s Daily Grind: HTTP Antivirus ProxyAug 31, 2006
Browsers live in continual danger of compromise by a malicious site. An intermediate proxy combined with a virus scanner can help.more »
Bot_Attack An insidious spam botnet attacks CharlyJul 31, 2006
While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.