Andrew Lock shows how to serve your customers by challenging industry norms, innovate with existing products and combine information with promotion to with your customers.
<b>Serverwatch:</b> "Based on Oracle's recent actions, it seems the company is hell-bent on driving as many of its potential customers as possible away from the UNIX offerings it acquired from Sun and into the arms of Red Hat and other enterprise Linux vendors."
<b>LinuxPR:</b> The GNOME Project is proud to announce GNOME 2.30, the latest stable release of the popular Free Software desktop environment and applications suite.
Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation.
<b>Phoronix:</b> "NVIDIA's open-source Linux efforts as it concerns their GPU support have historically been minimal. The xf86-video-nv driver has been around that provides very basic 2D acceleration and a crippled set of features besides that"
<b>Linux Pro Magazine:</b> ""People with disabilities deserve to have control of their own technological destinies." With this statement, the Free Software Foundation (FSF) announces that it is turning its attention to accessibility."
<b>LWN.net:</b> "One of the features expected with the upcoming Ubuntu 10.04 release is the Ubuntu One Music Store (UOMS). The UOMS is a mechanism by which Ubuntu users can purchase songs in the MP3 format, with some of the revenue going to support Canonical."
<b>Linux.com:</b> "This time around I'll focus more on Samba and how it is installed and configured to allow for the sharing of files and folders. For this article, we will look at the smb.conf configuration file and how it is set up and how to create new shares and even share printers."
<b>eSecurityPlanet:</b> "An audit by the Justice Department's Office of the Inspector General reveals that while the FBI and Justice Department have made "various efforts" to fight identity theft crimes in recent years, these initiatives have "faded as priorities" mainly because the agencies have failed to develop a coordinated plan to deal with what's become an epidemic of cybercrimes."
ASP.NET Developers, do you have ASP.NET pages that are slow to respond to the user and/or timeout. Try this technique to move those processes to the background and provide feedback to the user.
ASP.NET Developers, do you have ASP.NET pages that are slow to respond to the user and/or timeout. Try this technique to move those processes to the background and provide feedback to the user.
New study surveying Microsoft vulnerabilities concludes that most can be mitigated by tightening up admin permissions ahead of the monthly patch cycle.
Is your small business reputation on the line? Use this handy Web tool to find out. Plus, a how-to video resource and Google offers free social networking tools.
Is your small business reputation on the line? Use this handy Web tool to find out. Plus, a how-to video resource and Google offers free social networking tools.
Of course everyone is diligent about making timely backups. There are many ways to backup your data; here is the motley collection of backup schemes and devices that I use.
Adobe Acrobat and Reader PDF applications are vulnerable to a new attack that relies on social engineering to trick users into clicking on something they shouldn't.
By now, it's practically canon that bad passwords can have catastrophic consequences. What can a security admin do to ensure users are doing their part for server security? Enter Medusa, an open source software password auditing tool for Linux that will put all of your organization's passwords to the test.