Virtual Admin Tools for managing virtual environmentsJan 01, 2009
This month we examine techniques for deploying and managing virtual systems.more »
PHP The EXPERT’s VOIce® in Open Source PHP Objects, Patterns, and Practice Chapter 2: PHP and ObjectsDec 21, 2008
Objects were not always a key part of the PHP project. In fact, they have been described as an afterthought by PHP’s designers. As afterthoughts go, this one has proved remarkably resilient. In this chapter, I introduce coverage
of objects by summarizing the development of PHP’s object-oriented features.
The TangoCMS project has released version 2.2.0 of its web page content management system. Central to the release is resolving some security issues.more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn.more »
Seamless Integration Intro Expert techniques for living with WindowsDec 01, 2008
Yes, you can do that with Linux… Even if you want to live in an open source world, it's still full of Windows. This month we study strategies for Windows integration.more »
Top Ten Tops We pick the top ten Top toolsDec 01, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
Security Lessons (Almost) undetectable hardware-based rootkitsDec 01, 2008
We look at the history of the rootkit, including its newest incarnation, the DR RootKit.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.