Admin Workshop: Backups Insider Tips: BackupsApr 30, 2005
Data always seems to get lost at exactly the wrong moment, but the right backup strategy can help you restore those missing files.more »
Virtual Systems Intro Tools for virtual computing in LinuxApr 30, 2005
Windows apps with Wine Wine, Crossover Office, and CedegaApr 30, 2005
If you need to make a Windows application run on Linux, there is no better way than Wine. We investigated the free and commercial Wine variants to see how they bear up under real-life conditions.more »
Radius and 802.1X Securing Network Access with 802.1X, Radius, and LDAPFeb 28, 2005
The Radius protocol is typically used to authenticate users in dial-up scenarios. But Radius is also useful in LAN environments: in combination with 802.1X, Radius forces users to authenticate at a low level before the switch opens up a port.more »
SpamAssassin A Home-Grown Spam FilterFeb 28, 2005
Even if you do not have a mail server of your own, SpamAssassin can help you filter out unsolicited junk mail. This article describes how SpamAssassin collaborates with Evolution and KMail. Thunderbird, on the other hand, has its own simple spam-detection feature.more »
Admin Workshop:L ocks Insider Tips: LocksDec 31, 2004
A genuine multitasking system like Linux runs many processes concurrently. Programs must compete for data access. Assigning locks to files ensures exclusive access and prevents the possibility of data.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.