Microsoft Windows is usually a presence in most computing environments, and UNIX
administrators likely will be forced to use resources in Windows networks from
time to time. Although many are familiar with the Samba server software, the matching
smbclient utility often escapes notice.
Stories of compromised servers and data theft fill today’s news. It
isn’t difficult for someone who has read an informative blog post to
access a system via a misconfigured service, take advantage of a recently
exposed vulnerability or gain control using a stolen password. more>>
How would you find out how much RAM is free on your Linux desktop? That’s
a really easy question with a lot of answers—
free, any of
the implementations of
Glances all are valid responses. more>>
It used to be that the true sign you were dealing with a Linux geek
was the pile of computers lying around that person’s house. How else could
you experiment with networked servers without a mass of computers
and networking equipment? If you work as a sysadmin for a large
company, sometimes one of the job perks is that you get first dibs on
decommissioned equipment. more>>
One of the most important characteristics of the contemporary data center, notes
Applied Expert Systems, Inc. (AES), is that an ever-increasing amount of the traffic is
between servers. Realizing the resulting need to facilitate improved server-to-server
communications, AES developed CleverView for TCP/IP on Linux v2.5 with KVM Monitoring.
The first time I floated the “giant zero” metaphor for the Internet, was in my October 2007 “SuitWatch” newsletter for Linux Journal. more>>
We won the battle for Linux, but we’re losing the battle for
Linux turns 25 in August 2016. Linux Journal turned 21
in April 2016. (Issue #1 was
April 1994, the month Linux hit version 1.0.) We’re a generation into the
history of our cause, but the fight isn’t there anymore, because we won. Our
cause has achieved its effects.
OpenSwitch has joined the Linux Foundation’s stable of networking projects.
This is a significant step. It means the network operating system’s development will be driven
by community needs, instead of the needs of few private companies.
The distributed denial-of-service (DDoS) attack is the classic cheap hack. It requires virtually nothing of those who wield it beyond the ability to download something from the internet, yet a DDoS offers unusually public consequences (most real security breaches happen in the dark).
All web browsers have vulnerabilities, but one piece of Chinese software might be eligible for the title of most insecure browser ever. Likely unbeknown to its users, QQ Browser has been transmitting identifying information—including web histories, search queries, and nearby WiFi networks—with poorly implemented or no cryptographic protection.