Admin Workshop: X Window Insider Tips: The X Window SystemAug 31, 2005
Thanks to automatic hardware detection, today’s admins rarely need to configure the X window system manually. But if you want to use X11’s excellent networking capabilities and tuning options, you will certainly benefit from some background knowledge.more »
Charly's Column The Sysadmin’s Daily Grind: PortfwdAug 31, 2005
Incoming TCP connections do not always end up where they are supposed to. A freely configurable redirector points digital debris in the direction of a new and better place.more »
Admin Workshop: Documentation Insider Tips: Documentation in Unix and LinuxJul 31, 2005
System admins routinely refer to documentation for help with obscure command line options. In this month’s Admin Workshop, we examine the programs and formats behind the command line documentation you read everyday.more »
Bacula Better backups with the daemon-based Bacula backup systemJul 31, 2005
When backup jobs become too challenging for a script, the daemon-based free backup tool Bacula may be the answer.more »
Wine Running Windows Programs with the Wine APIJul 31, 2005
The Wine compatibility layer lets Linux users run Windows programs. Unfortunately, configuring Wine is anything but trivial, and it helps if you enjoy experimenting.more »
ARP Spoofing ARP spoofing and poisoningJun 30, 2005
Any user on a LAN can sniff and manipulate local traffic. ARP spoofing and poisoning techniques give an attacker an easy way in.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.