Archiving Email Techniques for archiving emailJun 29, 2010
Email archiving involves more than just backing up your email directories. It is also a question of classifying the email and making it easier for users to find their way around overfilled email folders.more »
The Linbit firm out of Vienna will take over care of the Heartbeat 2 cluster manager.more »
Backup specialist SEP is providing additional parts of its data security software under GPL, including disclosing the SEP file backup format.more »
The open source backup software Bacula has surpassed the 1 million mark in Sourceforge's download statistics.more »
The FreeNAS project had discussed whether the free storage systems should use BSD or Linux in the future. The result is that both variants will now be available.more »
The French-U.S. firm Arkeia Software is taking over Kadena Systems, the California backup provider specializing in eliminating redundancies.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Security Lessons Make off-site backups or you will lose your dataJul 31, 2009
Who needs attackers when you have system administrators? Learn why copying your data doesn't mean you've backed it up.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm