Home Search
bit - search results
If you're not happy with the results, please do another search
SysAdmin to SysAdmin: Toward a completely unattended Kickstart
Author: Brian Jones
There are probably thousands of people around the globe who wonder why so many
administrators around the globe continue to stick with Red...
The Legitimate Hacker
Author: Preston St. Pierre
Having attended many Linux-focused trade shows over the years, it's really interesting how things have changed. It's apparent that Linux is...
Linux Dictionary Update
Anonymous Reader writes "This document is designed to be a resource for those Linux users wishing to seek clarification on Linux/UNIX/POSIX related terms and...
LinuxWorld commentary: (Fill in here) now offers Linux support!
Author: Robin 'Roblimo' Miller
LINUXWORLD -- The main theme of this show ought to be, "We now offer Linux
support!" Most of the companies making this...
Open-Xchange Moves to Open Source License
Frank Neugebauer writes "It may be one of the most significant GPL moves made in the software industry
this year, but you may...
Seen at LinuxWorld Expo: Day one
Pictures from the LinuxWorld
Expo
-- people, places and things -- that you'd see if you were here,
starting with
the entrance to San Francisco's Moscone
Center,...
Securing Web services: PKI basics
Author: Jeffrey L. Vagle
Developers of Web services and enterprise applications must make their software secure. While cryptography alone does not a secure system...
Feather Linux mini linux live CD review
Barney Matthews writes "There has been quite a bit of talk about mini Linux distro's recently so I decided to take a look at...
Blackhat/Defcon: The final report
Author: Joe Barr
DEFCON 12, LAS VEGAS, NEVADA -- The week-long Defcon 12 and Blackhat Briefings ended Sunday. Taking center stage in our final...
POSIX ACLs in Linux
Author: Mike Peters
In most *nix filesystems administrators can assign read (r), write (w), and execute (x) permissions to files, and set permissions differently for...