Open source project Nagios is being forked into the Icinga project. The Netways firm, which specializes in open source IT management services and particularly the monitoring solution Nagios, will be managing the fork.more »
Multicast IP Exploring multicast IP in LinuxApr 30, 2009
We show you the practical side of multicasting, including a sample configuration that uses the free XORP routing protocol suite.more »
Charly's Column The Sysadmin's Daily Grind: NicToolApr 30, 2009
For the longest time, Charly used vi to edit his nameserver's zone data, which isn't too elegant because a mere fat-finger will get you into DNS trouble. Fortunately, NicTool will help ease the pain – even in the midst of a move big enough to kick up a dust storm.more »
When Jeff Mahoney sent in a bunch of patches for reiserfs, he assumed that the filesystem would be frozen in maintenance mode from that point on. Things turned out differently.more »
Webconverger, a Linux distro to drive web kiosk systems, is now available in version 4.7. Some updates improve its security.more »
Debian's Daniel Burrows has released a new version of the Aptitude standard package manager that ratchets up performance of the dependency solver, among other things.more »
Debian developer Robert Millan is offering an alternative kernel for Debian's Lenny free Linux distro. Unlike the standard Lenny kernel, it contains no proprietary firmware.more »
Following the news of Oracle's purchase of Sun, we hear a lot about MySQL, OpenOffice and VirtualBox. But Btrfs vs. ZFS is yet another highlight of the takeover.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm