Virtual Admin Tools for managing virtual environmentsDec 31, 2008
This month we examine techniques for deploying and managing virtual systems.more »
PHP The EXPERT’s VOIce® in Open Source PHP Objects, Patterns, and Practice Chapter 2: PHP and ObjectsDec 21, 2008
Objects were not always a key part of the PHP project. In fact, they have been described as an afterthought by PHP’s designers. As afterthoughts go, this one has proved remarkably resilient. In this chapter, I introduce coverage
of objects by summarizing the development of PHP’s object-oriented features.
The TangoCMS project has released version 2.2.0 of its web page content management system. Central to the release is resolving some security issues.more »
Red Hat president and CEO Jim Whitehurst sees opportunities for open source firms that might be putting undue burden on their dwindling IT departments because of the current economic downturn.more »
Seamless Integration Intro Expert techniques for living with WindowsNov 30, 2008
Yes, you can do that with Linux… Even if you want to live in an open source world, it's still full of Windows. This month we study strategies for Windows integration.more »
Top Ten Tops We pick the top ten Top toolsNov 30, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
Security Lessons (Almost) undetectable hardware-based rootkitsNov 30, 2008
We look at the history of the rootkit, including its newest incarnation, the DR RootKit.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.