Get help with specific problems with your technologies, process and projects.
Here's how to use iptable-based methods to protect against hackers' Secure Socket Shell attacks. Continue Reading
You can migrate to SugarCRM on Linux with tools like Apatar, an application that enables SugarCRM to speak to third-party databases and applications. Continue Reading
In this article, you'll learn how to make communication between Linux Server and PuTTY more secure by using SSH public/private keys.Continue Reading
: If you're migrating documents from Microsoft Word to OpenOffice.org on Linux, don't make the leap without considering the options, pitfalls and tools available.Continue Reading
When a user presents an Access Denied error message and says Samba is the culprit, is the blame warranted? Here's how to determine whether the error is the fault of Samba.Continue Reading
Contributor Sander van Vugt teaches you how to use GNOME to change desktop settings, use the Desktop Profile Editor and lock down the desktop.Continue Reading