The US National Aeronautics and Space Administration (NASA) is investing in a Linux super computer by SGI. The computer's 2048 CPU cores and 4TBytes RAM will run under a single Linux instance.more »
Accessing NTFS Intro Accessing NTFS partitions in LinuxDec 31, 2006
Whether you are troubleshooting or just configuring for efficiency, it is a good idea to explore your options for accessing your Windows partitions from Linux.more »
CD Encryption Burning CDs and DVDS with an encrypted filesystemOct 31, 2006
An encrypted hard disk on your server is no help if valuable data on CDs or DVDs falls into the hands of spies. We’ll show you some convenient solutions for encrypting data on removable media.more »
Crypto Tricks Intro Disk-level cryptography in LinuxOct 31, 2006
Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.more »
Encrypted Filesystems Shopping for an encrypted filesystemOct 31, 2006
If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.more »
DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSOct 31, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm