Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
Security Lessons: DNSSEC DNSSEC primerJun 28, 2010
One of the largest holes in the Internet is finally plugged.more »
Charly's Column The sys admin’s daily grind: login mailJun 28, 2010
Charly often gets suggestions and ideas for his column at community get-togethers. Last week, he picked up a tip for an early warning system that quickly secures login attempts.more »
Security Blanket Scanning, fixing, and reporting security issues with Security BlanketJun 24, 2010
Trusted’s Security Blanket lets you analyze security compliance in a few easy steps.more »
Security Lessons: Rsyslog Making sure your logs workApr 28, 2010
Might as well do it properly – rsyslog.more »
The Linbit firm out of Vienna will take over care of the Heartbeat 2 cluster manager.more »
Charly's Column The sys admin’s daily grind: SpamAssassin 3.3Mar 30, 2010
SpamAssassin is the backbone of countless anti-spam strategies. Its maintainers are cautious people and have just released the last major version since 2007. It’s definitely worthwhile.more »
Security Lessons: Spoofed Browsers Impersonating secure web serversMar 30, 2010
Find out why you can’t trust your web browser or certificate authorities.more »
Linux Foundation's big event celebrates the 25th anniversary of Linux
Linux has evolved from a “won’t be a professional” project to one of the most professional software projects in the history of computers.
Competitors get in the game with RHEL without Red Hat
Security researchers have already notified Microsoft; some fixes are available
The company is collaborating with Google and Intel to use Kubernetes as an engine for Fuel
Customers can take a free test drive of SLES for HPC on the Azure Cloud
San Francisco-based chip company announces their first fully open source chip platform.
The whole distro gets rebuilt on glibc 2.3
Ubuntu Vendor tries to solve app packaging and distribution problem across distributions.