Lead developer quells rumors that the Debian version is slated for center stage.
Typically when a network is under my control, I like my servers to have
static IPs. Whether the IPs are truly static (hard-coded into network
configuration files on the host) or whether I configure a DHCP server to make static
assignments, it’s far more convenient when you know a server always will have
the same IP. more>>
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
Large enterprises and nuclear laboratories aren’t the only organizations
that need an Internet access policy and a means of enforcing it. My
household has an Internet access policy, and the technique I’ve used to
enforce it is applicable to almost any organization. In our case, I’m not
too concerned about outside security threats. more>>
Whenever a server is accessible via the Internet, it’s a safe bet that
hackers will be trying to access it. Just look at the SSH logs
for any server you use, and you’ll surely find lots of “authentication
failure” lines, originating from IPs that have nothing to do with you
or your business. more>>
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
In recent years, there has been a trend in which data centers have been
opting for commodity hardware and software over proprietary solutions. Why
shouldn’t they? It offers extremely low costs and the flexibility to
build an ecosystem the way it is preferred. The only limitation is the extent
of the administrator’s imagination. more>>
I’ve always been a fan of putting aftermarket firmware on consumer-grade
routers. Whether it’s DD-WRT, Tomato, OpenWRT or whatever your favorite
flavor of “better than stock” firmware might be, it just makes economic
sense. Unfortunately, my routing needs have surpassed my trusty Linksys
HP’s annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
Is it weird to say that DNS is my favorite protocol? Because DNS
favorite protocol. There’s something about the simplicity of UDP packets
combined with the power of a service that the entire Internet relies on
that grabs my interest. Through the years, I’ve been impressed with just how
few resources you need to run a modest DNS infrastructure for an internal
In my last article, we began an exploration of date math by validating a given date
specified by the user, then explored how GNU date offers some slick math
capabilities, but has some inherent limitations, the most notable of which is
that it isn’t on 100% of all Linux and UNIX systems.
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Years ago, I worked for an automotive IT provider, and occasionally we went
out to the plants to search for rogue Wireless Access Points (WAPs). A
rogue WAP is one that the company hasn’t approved to be there. So if
someone were to go and buy a wireless router, and plug it in to the
network, that would be a rogue WAP. more>>
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.