Home Search

bit - search results

If you're not happy with the results, please do another search

SysAdmin to SysAdmin: Toward a completely unattended Kickstart

Author: Brian Jones There are probably thousands of people around the globe who wonder why so many administrators around the globe continue to stick with Red...

The Legitimate Hacker

Author: Preston St. Pierre Having attended many Linux-focused trade shows over the years, it's really interesting how things have changed. It's apparent that Linux is...

Linux Dictionary Update

Anonymous Reader writes "This document is designed to be a resource for those Linux users wishing to seek clarification on Linux/UNIX/POSIX related terms and...

LinuxWorld commentary: (Fill in here) now offers Linux support!

Author: Robin 'Roblimo' Miller LINUXWORLD -- The main theme of this show ought to be, "We now offer Linux support!" Most of the companies making this...

Open-Xchange Moves to Open Source License

Frank Neugebauer writes "It may be one of the most significant GPL moves made in the software industry this year, but you may...

Seen at LinuxWorld Expo: Day one

Pictures from the LinuxWorld Expo -- people, places and things -- that you'd see if you were here, starting with the entrance to San Francisco's Moscone Center,...

Securing Web services: PKI basics

Author: Jeffrey L. Vagle Developers of Web services and enterprise applications must make their software secure. While cryptography alone does not a secure system...

Feather Linux mini linux live CD review

Barney Matthews writes "There has been quite a bit of talk about mini Linux distro's recently so I decided to take a look at...

Blackhat/Defcon: The final report

Author: Joe Barr DEFCON 12, LAS VEGAS, NEVADA -- The week-long Defcon 12 and Blackhat Briefings ended Sunday. Taking center stage in our final...

POSIX ACLs in Linux

Author: Mike Peters In most *nix filesystems administrators can assign read (r), write (w), and execute (x) permissions to files, and set permissions differently for...