Remote Control Intro Remote control, screen sharing, and terminal service in LinuxOct 31, 2007
You can optimize your network by letting your systems share screen images, CPU cycles, and even mouse clicks. This month we look at remote control and terminal service technologies.more »
Version 3.0 of the network software by Vyatta has just been released. The Open Source software combines firewall, router and VPN software in a single product.more »
Novell is extending its portfolio of enterprise management solutions with its acquisition of Senforce Technologies, an endpoint security management specialist.more »
Network Monitoring Intro Network monitoring with NagiosJun 01, 2007
Are your systems behaving? Is your newest workstation too busy for its memory? Stay ahead of problems on your network with the free and versatile monitoring tool known as Nagios.more »
Living with Vista Windows in the world of LinuxMay 01, 2007
Home and business users are starting to wonder how Windows Vista will work with Linux. In this month’s cover story, we’ll show you Vista from the eye of Linux.more »
Udev Dynamic device management in UdevOct 01, 2006
After three years of hanging around on the sidelines, Udev has finally ousted the legacy Dev-FS system. We take a look under the hood at the Udev device management system inside your Linux system.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.