Detecting Intruders Intro Looking for signs of a network attackMar 31, 2007
If you think your systems are too obscure for an attacker to worry about, think again. Today’s intruders are happy for any victim.more »
Blocking Spam Intro Facing down the masterminds of unsolicited Internet mailFeb 28, 2007
Spammers charge real money for their dubious services, and hundreds of advertisers are willing to pay. We’ll show you some innovative techniques for controlling and containing spam, including strategies for slowing down spam bots, keeping spammers from getting your address, and separating spam from legitimate email.more »
Commercial Mail Servers Testing the Axigen, Kerio, and Merak commercial mail serversNov 30, 2006
They run on Red Hat Enterprise Linux, cost money, and juggle email messages: these three commercial mail servers aim to convince admins they are worth the price.more »
Charly's Column The Sysadmin’s Daily Grind: ZsyncOct 31, 2006
Zsync handles a special case: large volume download files that change frequently but not drastically. Charly shows how this handy file fetcher can save you time and bandwidth.more »
BOINC Building distributed applications with BOINCSep 30, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
Debian Hotplug Extending hotplug on Debian, SLES 9, and RHAS 4Sep 30, 2006
Debian hotplug is designed for little more than loading drivers and configuring devices. The collection of scripts discussed in this article helps Linux to respond when a network cable is plugged in or when a cellphone is in the vicinity. Read on for more on how to define custom hotplug events.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.