According to Dice, the recession is over for software developers, system administrators, and other IT specialists.more »
Roll Your Own Arch with Archiso Rolling your own Arch-based Linux Live image with ArchisoJan 23, 2013
Build a custom Live boot image with Arch Linux and Archiso.more »
Coping with UEFI Coping with the UEFI boot processJan 23, 2013
The UEFI boot specification offers new capabilities – and new headaches – if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
ngrep: Network Grep Network grepJan 23, 2013
Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.more »
Partition Rescue Using SystemRescueCd to recover partition dataDec 19, 2012
If your Linux or Windows system won’t boot, or if you’re worried that the hard disk is on its last legs, the first thing you need to do is rescue the partition data and copy it to a safe location.more »
File Transport Transferring large filesDec 19, 2012
Various alternatives let you work around pesky size limits when transferring a file from point A to point B.more »
TCP Fast Open Network acceleration with TCP Fast OpenDec 19, 2012
With TCP Fast Open, Google introduces a protocol extension, implemented in the Linux kernel, that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending on the application.more »
Linux Rescue Keeping your computer safe with LinuxDec 19, 2012
When thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm