Sudo and PolicyKit Assigning privileges with sudo and PolicyKitNov 26, 2012
If you give users who are usually supervised more scope to help themselves, they will need additional privileges. The sudo tool and the PolicyKit authorization service can control who does what on Linux.more »
WebIssues Tool Issue tracking and collaboration with WebIssuesNov 26, 2012
The WebIssues tool offers more than just bug tracking; it can help you manage complex multiuser projects as well.more »
Git 101 Not just for source code – Versioning with GitNov 26, 2012
When several people collaborate on source code or documents, things can get messy fast. Git provides a quick cure: The distributed versioning system reliably ensures the integrity and consistency of data with minimal effort.more »
Script Dialogs Automating tasks with SSH, Zenity, Yad, KDialog, PuTTY, WinSCP, and Rex Secure AgentNov 26, 2012
Starting a script on a Linux server with just a few mouse clicks sounds more complicated than it really is. If you want to create attractive and interactive dialogs for your desktop users, all you need is a small utility called SSH and a little Bash know-how.more »
When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Cloning Hard Disks Four tools for cloning hard disksJul 24, 2012
Is your hard disk making strange noises? Do you intend to make some major hardware changes? Maybe it’s high time to clone your disk. Four tools help Linux users and system administrators move their data and create one-to-one copies.more »
SSH with PAC Controlling SSH sessions with PACJul 24, 2012
PAC, with its convenient graphical connection manager, is a Linux application that manages SSH and other connections. The tool supports macros and lets users send commands to an entire cluster of servers simultaneously.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.