Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
Security Lessons: DNSSEC DNSSEC primerJun 28, 2010
One of the largest holes in the Internet is finally plugged.more »
Charly's Column The sys admin’s daily grind: login mailJun 28, 2010
Charly often gets suggestions and ideas for his column at community get-togethers. Last week, he picked up a tip for an early warning system that quickly secures login attempts.more »
Security Blanket Scanning, fixing, and reporting security issues with Security BlanketJun 24, 2010
Trusted’s Security Blanket lets you analyze security compliance in a few easy steps.more »
Security Lessons: Rsyslog Making sure your logs workApr 28, 2010
Might as well do it properly – rsyslog.more »
The Linbit firm out of Vienna will take over care of the Heartbeat 2 cluster manager.more »
Charly's Column The sys admin’s daily grind: SpamAssassin 3.3Mar 30, 2010
SpamAssassin is the backbone of countless anti-spam strategies. Its maintainers are cautious people and have just released the last major version since 2007. It’s definitely worthwhile.more »
Security Lessons: Spoofed Browsers Impersonating secure web serversMar 30, 2010
Find out why you can’t trust your web browser or certificate authorities.more »
Customers can take a free test drive of SLES for HPC on the Azure Cloud
San Francisco-based chip company announces their first fully open source chip platform.
The whole distro gets rebuilt on glibc 2.3
Ubuntu Vendor tries to solve app packaging and distribution problem across distributions.
Founder of ownCloud launches the Nextcloud project.
Will The Machine change the way future programmers think about memory?
The new Torus distributed storage system is available under an open source license on GitHub
Juries decides Google’s use of Java APIs Was Fair Use
But if you are not using the latest Linux kernel, your system is insecure.
Home routers will give room for custom firmware but still comply with FCC rules