We sat down with Dan Rosenberg, security consultant and kernel bug hunter, to talk about code auditing, kernel fuzzing, and getting started in the security business.
Agile software development is common, but system administrators often don't have comparable options. A Ruby-based Nagios plugin called Cucumber-Nagios could change this.
The SMB Traffic Analyzer is a VFS module that supports real-time analysis of data throughput on the SMB network. It includes analysis tools but also can use the RRDtool for visualization.
Computers age quickly and sometimes are unable to keep pace with rejuvenated software made more complex with every release. We examine the total cost of replacing compared with upgrading your machines.
Many applications interrupt the CPU when it tries to sleep. PowerTOP not only identifies these evildoers but also provides tips on how to get rid of them.
Microsoft released the latest version of Small Business Server 2011 in December. We look at the differences between the various editions and discuss their potential applications.
FreeNX and the WiKID Strong Authentication System combine to create open source remote access that delivers the speed of NX with the security of SSH tunnels and Linux.
Virtualization with VMware, KVM, and Xen is here to stay. But up to now, no virtual switch has supported complex scenarios. Open vSwitch supports flows, VLANs, trunking, and port aggregation just like major league switches.
Setting up high-availability cluster resources is part of the administrator's standard bag of tricks. We look at the basic setup of a cluster using the free OpenAIS/Corosync-based cluster suite.
Most Windows releases were criticized for sacrificing innovations for the sake of downward compatibility, but Windows 7 offers an XP mode that lets users continue to deploy XP applications.
Running a handful of commands on a large number of systems is a classic admin problem. Func gives administrators a useful alternative to loops and SSH connections.
Restricting FTP access on Solaris can be tricky. We show you how to create a secure chroot environment that restricts an SFTP user to a specific directory.