Charly's Column The Sysadmin’s Daily Grind: Surveillance with MotionAug 15, 2006
Commercial surveillance systems are expensive and typically involve maintenance agreements. I thought there must be a low-budget alternative.more »
Leaftag Making metadata with LeaftagAug 01, 2006
The experimental Leaftag provides a convenient means for associating files with search categories and other metadata.more »
AppArmor vs. SELinux Novell and Red Hat security experts face off on AppArmor and SELinuxAug 01, 2006
Security Enhanced Linux or App Armor? Linux Magazine invited two well-known personalities from Red Hat and Novell to debate the merits of their security systems.more »
Charly's Column The Sysadmin’s Daily Grind: PolicydJul 01, 2006
The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.more »
D-Bus and HAL Interprocess communication with D-Bus and HALJul 01, 2006
It’s the end of the line for CORBA! Gnome now relies on the D-Bus messaging system, and KDE is in the process of migrating.more »
Revision Control System Using RCS version control to manage simple scriptsJul 01, 2006
The Revision Control System (RCS) provides simple, reliable version control without the complexity of bigger systems like Subversion or CVS.more »
Sendmail Strategies Fighting spam and viruses with SendmailJul 01, 2006
A structured approach to Sendmail helps to maximize your spam and virus protection.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.