Charly's Column TUNNELING THE DUTCH BEACHESOct 01, 2006
What does Charly’s recent two-week vacation in Holland have in common with an SSH session? Nothing at all, at first sight. And therein lies a tale.more »
Perl: Link Spam A Perl script protects forums against spamOct 01, 2006
Spammers don’t just send email. They exploit discussion forums and blogs, posting pseudo-messages full of links to dupe search engines. A Perl script cleans up the mess.more »
Charly's Column The Sysadmin’s Daily Grind: HTTP Antivirus ProxySep 01, 2006
Browsers live in continual danger of compromise by a malicious site. An intermediate proxy combined with a virus scanner can help.more »
Bot_Attack An insidious spam botnet attacks CharlyAug 01, 2006
While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.more »
How to Write a Rootkit Rootkits for the Linux kernel 2.6Aug 01, 2006
Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.more »
Charly's Column The Sysadmin’s Daily Grind: PolicydJul 01, 2006
The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.