Charly's Column: lsof Sys Admin's Daily Grind: lsofJan 31, 2011
The shorter a command, the longer the list of support parameters. This rule applies to lsof, one of Charly’s favorite commands.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
Charly’s Column: Cluster SSH The sys admin’s daily grind: Cluster SSHDec 28, 2010
Charly doesn’t relish the idea of searching through the logfiles of a dozen proxy servers when page requests fail. Now that he has deployed Cluster SSH, he can pull the strings on many machines at the same time.more »
libguestfs 1.8.0, a library and tool set for virtual machine (VM) disk image management.more »
Google announced that Chrome is ready for business and the wait to deploy Chrome and Google Apps for Business is over.more »
To celebrate the new look of and solicit user feedback on their commercially offered Ubuntu Advantage Program, Canonical is offering a free 30-day trial version of Landscape.more »
Letters Write AccessNov 23, 2010
Dear Rikki Kite: I picked up a copy of Linux Magazine the other day and read your most current, interesting article. Since you welcomed ideas for topics, I have a topic that never seems to be addressed.more »
Centrify Express now available through the Ubuntu Software Partner Repository.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.