Detecting Intruders Intro Looking for signs of a network attackApr 01, 2007
If you think your systems are too obscure for an attacker to worry about, think again. Today’s intruders are happy for any victim.more »
Blocking Spam Intro Facing down the masterminds of unsolicited Internet mailMar 01, 2007
Spammers charge real money for their dubious services, and hundreds of advertisers are willing to pay. We’ll show you some innovative techniques for controlling and containing spam, including strategies for slowing down spam bots, keeping spammers from getting your address, and separating spam from legitimate email.more »
Commercial Mail Servers Testing the Axigen, Kerio, and Merak commercial mail serversDec 01, 2006
They run on Red Hat Enterprise Linux, cost money, and juggle email messages: these three commercial mail servers aim to convince admins they are worth the price.more »
Charly's Column The Sysadmin’s Daily Grind: ZsyncNov 01, 2006
Zsync handles a special case: large volume download files that change frequently but not drastically. Charly shows how this handy file fetcher can save you time and bandwidth.more »
BOINC Building distributed applications with BOINCOct 01, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
Debian Hotplug Extending hotplug on Debian, SLES 9, and RHAS 4Oct 01, 2006
Debian hotplug is designed for little more than loading drivers and configuring devices. The collection of scripts discussed in this article helps Linux to respond when a network cable is plugged in or when a cellphone is in the vicinity. Read on for more on how to define custom hotplug events.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.