Trouble Ticket Software Linux Trouble Ticket SoftwareJan 31, 2005
If your help line serves outside users, keeping track of support requests can mean the difference between a repeat customer and a lost customer. If the line serves inside employees, an efficient response means better productivity. Fortunately,several Linux-based applications offer help for your help desk or hotline.more »
deskTOPia Setting up SuxPanelDec 31, 2004
Even the smallest desktop has room
for a panel. If your choice of a window
manager does not support a suitable
panel alternative,you can always add
a panel like SuxPanel. Suxpanel provides
many useful features for the
desktop,and it even it even supports
Bridgewall Implementing a bridging-level firewallDec 31, 2004
Firewalls are typically implemented as routers,but it doesn’t have to be that way. Bridging packet filters have a number of advantages,and you can add them to your network at a later stage without changing the configuration of your network components.more »
Guarddog Firewall configurations with GuarddogDec 31, 2004
The KDE Guarddog program promises an easy Linux firewall setup with just a few clicks. Guarddog helps inexperienced users secure computers – and even whole networks – against attack.more »
Firewalls Intro Firewalls for the everydayDec 31, 2004
Firewalls are becoming evermore sophisticated. Luckily, the tools for managing firewalls are becoming simpler and more accessible for ordinary usersmore »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm