Debian Hotplug Extending hotplug on Debian, SLES 9, and RHAS 4Sep 30, 2006
Debian hotplug is designed for little more than loading drivers and configuring devices. The collection of scripts discussed in this article helps Linux to respond when a network cable is plugged in or when a cellphone is in the vicinity. Read on for more on how to define custom hotplug events.more »
Samba 4 A first look at Samba 4May 31, 2006
A technical preview version of Samba 4 became available at the end of January. We took a look at what’s coming in the next version of the Samba file and print service suite.more »
Charly's Column The Sysadmin’s Daily Grind: Nmap 4Apr 30, 2006
Many tools keep growing with each new version, but Nmap 4.00 has lost weight thanks to the Diet-Nmap project. The latest incarnation of Nmap is not only quicker, it is also more frugal with memory.more »
Charly's Column The Sysadmin’s Daily Grind: EthtoolMar 31, 2006
A touchy LAN that plays like a movie diva can spoil any admin’s day. Ethtool to the rescue!more »
Netfilter L7 Blocking protocols at Layer 7 with the L7 patchFeb 28, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
SSL-Explorer Test: An easy VPN with SSL-ExplorerJan 31, 2006
SSL-Explorer provides an easy, web-based interface for configuring a virtual private network.more »
Traffic shaping with Trickle Accelerating downloads with TrickleDec 31, 2005
Is your Internet connection groaning under the load of too many simultaneous downloads? If so, try Trickle, a simple application that gives you more granular control over network traffic.more »
Wlassistant Wlassistant helps you attach to a WLANNov 30, 2005
Laptop users who move among wireless networks need a simple and practical means for getting connected. A KDE tool titled Wlassistant helps you find the signal.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm