Articles

Cross-Vendor IPsec

Any implementation of the standards-based IPsec is supposed to work with any other implementation – but sometimes you need a little extra effort. This article tests some IPsec implementations to see how well they fit.

MariaDB vs. MySQL

MariaDB is a cousin of MySQL – but not an identical twin.

Green IT

Computers age quickly and sometimes are unable to keep pace with rejuvenated software made more complex with every release. We examine the total cost of replacing compared with upgrading your machines.

PowerTOP

Many applications interrupt the CPU when it tries to sleep. PowerTOP not only identifies these evildoers but also provides tips on how to get rid of them.

Confessions of a Patchaholic

Managing patches, service packs and updates in a heterogeneous environment is one of the leading causes of sleep deprivation among system administrators. The big question is, “How do you manage patches in a complex environment?”

Power Talk

AMD is poised to announce a new generation of processors, including the Bulldozer series, which is targeted for data centers and HPC implementations. We asked John Fruehe, AMD's Director of Product Marketing for the server and embedded space, for an inside look at what's coming with Bulldozer and what it means for HPC vendors and customers.

Can Your Server Be Toppled with a Single Command?

The common Apache benchmarking tool known as ab can carry off a highly effective DoS attack if you're not prepared for it.

BackTrack Linux: The Ultimate Hacker's Arsenal

Penetration Testing and security auditing are now part of every system administrator's "other duties as assigned." BackTrack Linux is a custom distribution designed for security testing for all skill levels from novice to expert.

Book Review: Land of Lisp

The elegant Lisp is known as a beautiful, but not always approachable, programming language. Conrad Barski's Land of Lisp is a smart and accessible guide to the enigmatic functional programming language.

Arp Cache Poisoning and Packet Sniffing

Intruders rely on arp cache poisoning to conceal their presence on a local network. We'll show you some of the tools an attacker might use to poison the arp cache and gather information on your network.