Advanced search


Report Card  

The JasperReports report generator uses data from a variety of sources and outputs the results to a printer, a screen, or a file in several export formats.

Administrative Assistant  

Google created a special Linux distribution called Kubernetes to simplify life with Docker.

Pitching the Tent  

The OpenStack project has released the latest version of its software, code-named Kilo. We take a closer look.

Cloud Watcher  

Apache Aurora is a service daemon built for the data center.

End of Story  

Support for Windows Server 2003 has been discontinued. We take a look at some migration options.

Mail Call  

Microsoft Exchange and Lotus Notes hold onto the big chunks of the groupware market, and social networks are rushing to transform the space. All the same, free software provides an effective and inexpensive alternative.

Quick Edit  

With sed, you can edit text data without an interactive user interface, using pipes or input redirection. Sed lets you execute extensive editing commands on a single line.

Weak Passwords – The Attacker's Low-Hanging Fruit  

By now you've probably heard that Italy's Hacking Team, a company that sells intrusion and surveillance tools to governments and law enforcement agencies, has had its private information laid bare for the entire world. Almost 400GB of data, published in a single Torrent file, made its way onto the Internet for all to enjoy. The initial entry point for the attack is unclear, but one thing is certain: The Hacking Team needs to attend a seminar on password security.

Locked Away  

We compare three mail archiving tools: Piler, Benno MailArchiv, and MailArchiva.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.