KEY EXPERIENCE The sys admin's daily grind: Single-packet authenticationAug 26, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Remote Terminal Service with NX Lean terminal services with NXJun 20, 2008
NX provides fast terminal services, even over slow connections.more »
Rdesktop Windows terminal services in Linux with RdesktopJun 20, 2008
Windows terminal services in Linux with Rdesktopmore »
AuFS Configuring the AuFS filesystem for terminal clientsJun 19, 2008
AuFS offers a painless filesystem for a thin client, and FS-Cache provides a persistent cache.more »
Sun Microsystems has now released a management solution following its Xen-based virtualization solution, XVM.more »
Load Average Understanding load averages and stretch factorsOct 26, 2007
What is the real meaning of those little “load average” values in the output of shell commands like procinfo and uptime, and what can you do with these numbers?more »
Setting Up a Quake Server Configuring a Quake3 Arena serverSep 26, 2007
You don’t have to be an expert to set up your own Quake 3 game server.more »
Version 3.00 of the free logfile analyzer W3Perl has just been released, and includes a number of enhancements. Among other features, the program now supports weekly and monthly statistics with the same granularity as daily reports, and can email the results if needed.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm