Post

Using Linux Scripts to Monitor Security

This paper will show how to use basic Linux scripting to create a reusable network security monitor that is easy to use and easy to maintain. The purpose of this exercise is introduced with suggestions where it might be useful. Linux commands are discussed, along with techniques to automate them and interpret their results. Methods...

On June 8, 2010June 8, 2010by
Post

Hardware, Linux Support Becoming More Transparent

Posted by Ken Hardin HP’s announcement that it plans to support the Debian Linux distro for some of its server products reflects what may be a growing trend of hardware vendors bypassing Linux OS partners and just handling support themselves. Unlike Red Hat, which makes its money from support and maintenance, and SuSE, with its...

On June 8, 2010June 8, 2010by
Post

Ubuntu Shifts Strategy to Servers

Posted by Lora Bentley Because 70 percent of Canonical’s services revenue comes from the server side of its Ubuntu business, the company behind the popular Linux distro plans to beef up its server software, Computerworld reports. Ubuntu is well-liked enough among its desktop users — my boss being one of the newest — that Dell...

On June 8, 2010June 8, 2010by
Post

The Five Things You Aren’t Allowed to Discuss About Linux

Posted by Rob Enderle I started writing about Linux not because I thought it interesting, fascinating, or even because I liked to code (I don’t). I started writing about Linux because I was told I couldn’t and the more people told me I couldn’t, and particularly when they said “or else,” the more the Linux...

On June 8, 2010June 8, 2010by