Encrypted Filesystems Shopping for an encrypted filesystemOct 31, 2006
If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.more »
DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSOct 31, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
BOINC Building distributed applications with BOINCSep 30, 2006
Grid computing lets little PCs work on big problems. You can use the grid system of the famous SETI@home project to build your own grid computing solutions.more »
File systems Finding the right file systemMar 31, 2006
Many users just opt for the defaults and don’t think about the file system when they install Linux. But if better performance is your goal, it pays to do some shopping.more »
hdparm and DMA Speeding up hard disks with DMAMar 31, 2006
A simple command helps you switch on the afterburner for your hard disks and drives. hdparm improves the performance of your storage devices.more »
Linux Tuning Intro Techniques for better performanceMar 31, 2006
Are your multimedia applications receiving the resources they need? Are you using the optimum filesystem for your environment? You don't have to be an expert to find better performance in Linux – you just need to know where to look.more »
Deleting Data Safely deleting dataFeb 28, 2006
Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.