Encrypted Filesystems Shopping for an encrypted filesystemNov 01, 2006
If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.more »
DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSNov 01, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
BOINC Building distributed applications with BOINCOct 01, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
File systems Finding the right file systemApr 01, 2006
Many users just opt for the defaults and don’t think about the file system when they install Linux. But if better performance is your goal, it pays to do some shopping.more »
hdparm and DMA Speeding up hard disks with DMAApr 01, 2006
A simple command helps you switch on the afterburner for your hard disks and drives. hdparm improves the performance of your storage devices.more »
Linux Tuning Intro Techniques for better performanceApr 01, 2006
Are your multimedia applications receiving the resources they need? Are you using the optimum filesystem for your environment? You don't have to be an expert to find better performance in Linux – you just need to know where to look.more »
Deleting Data Safely deleting dataMar 01, 2006
Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.