Encrypted Filesystems Shopping for an encrypted filesystemNov 01, 2006
If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.more »
DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSNov 01, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
BOINC Building distributed applications with BOINCOct 01, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
File systems Finding the right file systemApr 01, 2006
Many users just opt for the defaults and don’t think about the file system when they install Linux. But if better performance is your goal, it pays to do some shopping.more »
hdparm and DMA Speeding up hard disks with DMAApr 01, 2006
A simple command helps you switch on the afterburner for your hard disks and drives. hdparm improves the performance of your storage devices.more »
Linux Tuning Intro Techniques for better performanceApr 01, 2006
Are your multimedia applications receiving the resources they need? Are you using the optimum filesystem for your environment? You don't have to be an expert to find better performance in Linux – you just need to know where to look.more »
Deleting Data Safely deleting dataMar 01, 2006
Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives