Table of Contents: 152 What's inside the July 2013 issueMay 20, 2013
We look at SharePoint integration and show you how to manage Active Directory from Linux. But first, a special story on a dangerous new class of intrusion tools.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
Security Lessons: OpenSSH VPNs Building SSH VPNs with OpenSSHSep 21, 2012
OpenSSH VPN technology, installed by default on most Linux, BSD, and Unix systems, lets you mix and match different clients and servers easily.more »
- Android gains market share
- VMware Workstation
- Perforce on Demand
- openSUSE 12.2 released
- CUDA 5 rc
- Web Foundation index measures world
- New Z shell release first since 2004
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
Are you ready for IPv6? Celebrate International Sysadmin Day with a free copy of the ADMIN IPv6 Special courtesy of Splunk and ADMIN Magazine.more »
SSH with PAC Controlling SSH sessions with PACJul 24, 2012
PAC, with its convenient graphical connection manager, is a Linux application that manages SSH and other connections. The tool supports macros and lets users send commands to an entire cluster of servers simultaneously.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.