According to Dice, the recession is over for software developers, system administrators, and other IT specialists.more »
Roll Your Own Arch with Archiso Rolling your own Arch-based Linux Live image with ArchisoJan 23, 2013
Build a custom Live boot image with Arch Linux and Archiso.more »
Coping with UEFI Coping with the UEFI boot processJan 23, 2013
The UEFI boot specification offers new capabilities – and new headaches – if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
ngrep: Network Grep Network grepJan 23, 2013
Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.more »
Partition Rescue Using SystemRescueCd to recover partition dataDec 19, 2012
If your Linux or Windows system won’t boot, or if you’re worried that the hard disk is on its last legs, the first thing you need to do is rescue the partition data and copy it to a safe location.more »
File Transport Transferring large filesDec 19, 2012
Various alternatives let you work around pesky size limits when transferring a file from point A to point B.more »
TCP Fast Open Network acceleration with TCP Fast OpenDec 19, 2012
With TCP Fast Open, Google introduces a protocol extension, implemented in the Linux kernel, that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending on the application.more »
Linux Rescue Keeping your computer safe with LinuxDec 19, 2012
When thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.