Charly's Column The Sysadmin’s Daily Grind: smapJul 09, 2008
On a trip to Berlin, Charly discovers that the nmap port scanner has a new cousin who enjoys spying on phones – smap scans networks for VoIP devices.more »
Hewlett-Packard has now completed the acquisition of Neoware. The thin client computing and virtualization solution provider will add value to HP's Linux portfolio.more »
Charly's Column The Sysadmin’s Daily Grind: ArpalertNov 30, 2006
Corporate policies prohibit the unauthorized connection of hardware to the company network, threatening dire consequences in the case of non-compliance. Fair enough, but how do you actually go about catching somebody trying to plug an illegal laptop into your Ethernet?more »
Squid Bridge HTTP proxy with caching and content filtering on a bridgeOct 31, 2006
Caching proxies remember web pages and serve them up locally, saving both money and time. The most intelligent members of this family also remove dangerous content and provide transparent bridging.more »
Charly's Column TUNNELING THE DUTCH BEACHESSep 30, 2006
What does Charly’s recent two-week vacation in Holland have in common with an SSH session? Nothing at all, at first sight. And therein lies a tale.more »
BOINC Building distributed applications with BOINCSep 30, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
Hotplug Hacks Intro Extending the Linux hotplug systemSep 30, 2006
Hotplugging is invisible and automatic – if you want it to be. But a close look at the Linux hotplug system reveals interesting opportunities for customization.more »
Ivman Building in hotplug with IvmanSep 30, 2006
Better knowledge of the Linux hotplug system opens the door to to innovation and automation. We’ll show you a custom backup solution for laptop computers.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.