-
+36 +5
Shim vulnerability exposes most Linux systems to attack
This low-level software is the glue that enables Linux to run on Secure Boot PCs, and it has a nasty problem.
-
+45 +4
Tuning the Linux kernel with AI, according to ByteDance
Linux works well for most jobs, but to get it to work great requires kernel tuning, and that's never easy. ByteDance has a proposal to make this easier.
-
+62 +5
Linux Server Operating Systems: Red Hat Enterprise Linux and Beyond
Besides Red Hat Enterprise Linux, several RHEL rival clones and offshoots are vying for your Linux server and cloud dollar. Here's what's with them.
-
+7 +3
Spare external hard drives gathering dust? Share your stuff with fellow cloud fear types
turns an external disk into a private cloud for your devices
-
+3 +3
Free Networking Tools
A frequently updated list of useful freeware tools for network administrators
-
+10 +2
How internet will transform online sharing in future
Researchers have taken the first step towards a radical new architecture for the internet, which they claim will transform the way in which information is shared online, and make it faster and safer to use.
-
+2 +2
The Open Web Application Security Project (OWASP)
the free and open software security community
-
+13 +3
How long do disk drives last?
How long do disk drives last? The short answer is: we don’t know yet, but it’s longer than you might guess.
-
+1 +1
The Agreeable Cow
A place for Systems Administrators and IT Professionals to find and share ideas, solutions and templates.
-
+1 +1
Server Fault
Server Fault is a question and answer site for professional system and network administrators.
-
+10 +1
Is your employer, school, or Internet provider eavesdropping on your secure connections?
GRC's HTTPS Web Server Certificate Fingerprint Service: Secure browser connections can be intercepted and decrypted by authorities who spoof the authentic site's certificate. But the authentic site's fingerprint CANNOT be duplicated!
-
+5 +3
A Proper Server Naming Scheme
It’s a problem that goes back as far as computers have existed, and everyone has their own opinion on the “best” way to name hosts. Most methods start out fine at the beginning, but quickly become unwieldy as infrastructure expands and adapts over time.
-
+3 +2
Group Policy Search
The GPS is a group policy search tool for Microsoft Active Directory Group Policy Settings.
-
+6 +1
Group Policy Central
The one stop web resource for Group Policy Administrators...
-
+4 +1
Professor Messer System Admin Training Videos [YouTube]
Professor Messer System Admin Training Videos - Free training videos for System Administrators and System Administrator Certificate Exams
-
+7 +1
match command-line arguments to their help text
match command-line arguments to their help text
-
+1 +1
Graphical Network Simulator - GNS3
GNS3, the Graphical Network Simulator. Run Cisco, Juniper and open-source virtual networks on your PC!
-
+18 +1
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)
You may know what a VPN, or Virtual Private Network, is; you probably don't use one. You really should be using a VPN, and even if you don't think so now, at some point in the future you may consider it as important as your internet connection.
-
+16 +1
The IT Department Is Dead. Long Live the IT Department.
In the brave new world imagined by four Silicon Valley startups -- Evernote, Box, GitHub, and Asana -- the role of IT is changing. Instead of the people who say no, they will be the people who say yes.
-
+19 +1
Getting Started with PowerShell 3.0 (Channel 9)
This Jump Start is designed to teach the busy IT Professionals about this powerful management tool. Learn how PowerShell works and how to make PowerShell work for you from the experts Jeffrey Snover,
Submit a link
Start a discussion