Charly's Column The Sysadmin’s Daily Grind: Surveillance with MotionAug 14, 2006
Commercial surveillance systems are expensive and typically involve maintenance agreements. I thought there must be a low-budget alternative.more »
Leaftag Making metadata with LeaftagJul 31, 2006
The experimental Leaftag provides a convenient means for associating files with search categories and other metadata.more »
AppArmor vs. SELinux Novell and Red Hat security experts face off on AppArmor and SELinuxJul 31, 2006
Security Enhanced Linux or App Armor? Linux Magazine invited two well-known personalities from Red Hat and Novell to debate the merits of their security systems.more »
Charly's Column The Sysadmin’s Daily Grind: PolicydJun 30, 2006
The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.more »
D-Bus and HAL Interprocess communication with D-Bus and HALJun 30, 2006
It’s the end of the line for CORBA! Gnome now relies on the D-Bus messaging system, and KDE is in the process of migrating.more »
Revision Control System Using RCS version control to manage simple scriptsJun 30, 2006
The Revision Control System (RCS) provides simple, reliable version control without the complexity of bigger systems like Subversion or CVS.more »
Sendmail Strategies Fighting spam and viruses with SendmailJun 30, 2006
A structured approach to Sendmail helps to maximize your spam and virus protection.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm