Sysadmin Stories Three case studies in the life of an adminJul 11, 2008
A day on Charly’s network might bring out problems with Ethernet bonding, VLANs and switches, and rogue DHCP servers.more »
Charly's Column The sys admin’s daily grind: P3ScanJul 02, 2008
Checking email for viruses is typically the domain of the SMTP gateway or a server directly downstream of it. In this month’s column, Charly decides to move this protection to the other side – that is, to the client connections
with their SMTP and POP servers.
The free Samba project has just released version 3.2 of the file and printer server for Microsoft Windows clients. The team will be moving to the GPL v3 license as of this version.more »
Light Web Server Alternatives The Cherokee and Lighttpd alternative web serversJul 01, 2008
Apache has ruled the web since the mid-90s, but not all users are happy with it. Recent competitors Cherokee and Lighttpd offer an uncomplicated alternative for users who are looking for something light.more »
Askerisk Calling on the Network with AsteriskJul 01, 2008
If you want advanced features without the expense, try a VoIP phone system. We’ll show you how to configure your own Asterisk telephone exchange server.more »
Rdesktop Windows terminal services in Linux with RdesktopJun 20, 2008
Windows terminal services in Linux with Rdesktopmore »
LTSP Getting started with the Linux Terminal Server ProjectJun 19, 2008
The Linux Terminal Server Project offers a comprehensive approach to terminal services in Linux, including easy access to local sound cards, printers, and USB sticks.more »
AuFS Configuring the AuFS filesystem for terminal clientsJun 19, 2008
AuFS offers a painless filesystem for a thin client, and FS-Cache provides a persistent cache.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm