Remote Control Controlling PCs with an Android smartphoneJun 19, 2012
Did you leave your system running? Did you forget to start a critical backup? Control your Linux computer from anywhere with an Android phone.more »
Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.more »
Security Lessons: cgroups and LXC Fleet and flexible cgroups and Linux ContainersAug 03, 2011
The big virtualization tools like KVM and Xen can’t compete on a small scale with resource-spare cgroups and Linux Containers.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Supermicro announces its SSE-X24S, a new high-performance, 10Gb Ethernet switch.more »
PHP Shell and Shell in a Box PHP Shell: Muscle PlayMay 17, 2011
Firewalls often block shell access for remote users on a corporate network or at an Internet cafe. Luckily, tools like PHP Shell and Shell in a Box put the shell in a browser window.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Charly's Column: tcpflow and HugeURL tcpflow and HugeURLApr 29, 2011
First the fun, then the pleasure: This month, we look at a TCP that administrators have to take seriously, followed by some URL fun.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.