Network Block Devices A new mission for the network block deviceAug 31, 2006
You don’t need Samba or NFS to support a diskless client. A remote block device can help improve performance and efficiency. We'll show your how.more »
Bot_Attack An insidious spam botnet attacks CharlyJul 31, 2006
While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.more »
Charly's Column The Sysadmin’s Daily Grind: DnsgraphJul 31, 2006
A partly overloaded DNS server can slow down all the workstations on the network. Dnsgraph is an early warning system that gives administrators a graph of critical values. Your Dnsgraph charts will help you keep your systems serving names.more »
Antsp2p Anonymous Filesharing with Antsp2pMay 31, 2006
Filesharing is a favorite leisure activity for many Internet users. But conventional filesharing tools have one major drawback – they aren’t anonymous. The Antsp2p project aims to change this.more »
Charly's Column The Sysadmin’s Daily Grind: Nmap 4Apr 30, 2006
Many tools keep growing with each new version, but Nmap 4.00 has lost weight thanks to the Diet-Nmap project. The latest incarnation of Nmap is not only quicker, it is also more frugal with memory.more »
Charly's Column The Sysadmin’s Daily Grind: Webalizer XtendedFeb 28, 2006
Webalizer is a tool for analyzing web server logfiles. A new patch lets admins see what isn’t there.more »
Twisted Creating network apps with TwistedFeb 28, 2006
The Twisted framework makes it so easy to create network-aware applications in Python. Twisted speaks all the major Internet protocols, from mail through chat, and it can handle encryption. We’ll show you how to set up a personal web server with Twisted.more »
Asterisk Telephony with an Asterisk phone systemJan 31, 2006
An old computer is all you need to build your own do-it-yourself personal phone server.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems