New tool will look like GParted but support a wider range of storage technologies.more »
Command Line – Probing /proc Understanding the transitory /proc filesystemMar 15, 2013
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.more »
Command Line: File Management Advanced file managementNov 26, 2012
Once you’ve mastered the everyday commands for manipulating files, you might want to do more. We show you some powerful commands for advanced file management.more »
Filesystems Benchmarked Linux Filesystem Performance TestsNov 20, 2012
Choosing the right filesystem for a particular job can be a difficult task. We tested seven candidates and found some interesting results to make an administrator’s choice easier.more »
Fstransform converts a filesystem without formatting the media or deleting any files.more »
Command Line: Mounting Devices Readying devices for useSep 21, 2012
We show you how to add devices to and remove them from your system while keeping it stable and secure.more »
Table of Contents: 144 HadoopSep 21, 2012
Getting into high-performance computing has never been easier. We investigate HPC cloud computing and a popular Big Data platform.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm