Linux Tuning Intro Techniques for better performanceApr 01, 2006
Are your multimedia applications receiving the resources they need? Are you using the optimum filesystem for your environment? You don't have to be an expert to find better performance in Linux – you just need to know where to look.more »
Deleting Data Safely deleting dataMar 01, 2006
Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.more »
DM-Crypt Hard disk encryption with DM-Crypt, LUKS, and cryptsetupDec 01, 2005
If you’re serious about keeping secrets, try hard disk encryption with DM-Crypt and LUKS.more »
Captive NTFS Accessing partitions on dual-boot systemsAug 01, 2005
Why reboot every time you need to access data on the other side of your dual boot system? We’ll introduce you to Captive NTFS – a free tool for reaching Windows NTFS partitions from Linux. We’ll also show you some handy tools for reading Linux partitions from Windows.more »
GMailFS GmailFS: Using a mail account as a filesystemJun 01, 2005
Why let a 2 Gigabyte email account go to waste? GmailFS lets you use Gmail as a storage medium for a mountable filesystem.more »
Admin Workshop: Finding Files Insider Tips:F ind and LocateFeb 01, 2005
Modern computers with their multiple Gigabyte hard disks store thousands of files. A lost file can cause a lot of work,and it can also pose a security risk. Fortunately,Linux has some versatile tools for finding those “lost files.”more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.