Sysadmin Stories Three case studies in the life of an adminJul 11, 2008
A day on Charly’s network might bring out problems with Ethernet bonding, VLANs and switches, and rogue DHCP servers.more »
Charly's Column The sys admin’s daily grind: P3ScanJul 02, 2008
Checking email for viruses is typically the domain of the SMTP gateway or a server directly downstream of it. In this month’s column, Charly decides to move this protection to the other side – that is, to the client connections
with their SMTP and POP servers.
The free Samba project has just released version 3.2 of the file and printer server for Microsoft Windows clients. The team will be moving to the GPL v3 license as of this version.more »
Light Web Server Alternatives The Cherokee and Lighttpd alternative web serversJul 01, 2008
Apache has ruled the web since the mid-90s, but not all users are happy with it. Recent competitors Cherokee and Lighttpd offer an uncomplicated alternative for users who are looking for something light.more »
Askerisk Calling on the Network with AsteriskJul 01, 2008
If you want advanced features without the expense, try a VoIP phone system. We’ll show you how to configure your own Asterisk telephone exchange server.more »
Rdesktop Windows terminal services in Linux with RdesktopJun 20, 2008
Windows terminal services in Linux with Rdesktopmore »
LTSP Getting started with the Linux Terminal Server ProjectJun 19, 2008
The Linux Terminal Server Project offers a comprehensive approach to terminal services in Linux, including easy access to local sound cards, printers, and USB sticks.more »
AuFS Configuring the AuFS filesystem for terminal clientsJun 19, 2008
AuFS offers a painless filesystem for a thin client, and FS-Cache provides a persistent cache.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems