Open source Marionette Project becomes part of Puppet.more »
Charly's Column: GestióIP The sys admin’s daily grind: GestióIPSep 29, 2010
A tidy house, a tidy mind they say, and I’ll leave it up to you to consider what being disorganized might mean. Anybody who has tried to manage hundreds of IP addresses using just a sheet of paper or a spreadsheet will probably appreciate some help.more »
Beginners: File Control Getting to grips with Linux PermissionsSep 27, 2010
From the vault:This article first appeared in issue #1 (October 2000). You'll also find this article on our 10-year anniversary Archive DVD included in issue #120 (November 2010).
With any operating system it is important to ensure that users remain in control of their files and directories and are prevented from tampering with those belonging to other users, or the system. This is what the Linux permissions system is all about, as Jono Bacon explains.more »
Move replaces Windows Live Spaces, adds 7 million users to WordPress.more »
Federal Communications Commission follows The White House's lead.more »
Drupal announces what they hope to be the final alpha build of version 7.x.more »
Charly's Column: My Traceroute Sysadmin's daily grindAug 31, 2010
Charly takes the name of the “My Traceroute” tool very literally. The journey is the reward for this alternative TTL-measuring utility.more »
'Crane' allows MySQL data integration in Hadoop.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.