Although spam filtering and blocking is helpful for the end user, it doesn't stop the production of spam. KnujOn strikes spam at the source.more »
Synctool, a configuration managemment tool that synchronizes computer clusters, is available in a new 4.0 version. The software underwent some internal rework and picks up new features.more »
Template Builder as of now is a permanent part of Oracle's JeOS mini-Linux and produces images, known as templates, for Oracle VM.more »
Perl: Tracking Online Orders Perl keeps track of online ordersJul 01, 2009
A distributed database based on the distributed Git version control system relies on a Perl script to help users track Internet orders. When the goods arrive, purchasers update their stock counts, wherever they may be at the time.more »
Market research firm IDC just finished a study of open source enterprise applications with decision makers in 515 European organizations. The result: open source is undergoing market expansion in business applications.more »
GLPI Managing resource information in GLPIJun 01, 2009
Anyone working in information technology knows how hard it is to keep track of inventory, maintenance history, and user support requests. GLPI puts the details in reach.more »
With version 6 of the web content and document managment suite Jahia has set the Swiss enterprise bearing the same name onto a higher level in terms of standard and reputability.more »
Cfengine 3 Managing the network with CfengineApr 01, 2009
Automate admin tasks with the powerful Cfengine framework.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.