Offline FS Staying in sync with a network filesystemJan 31, 2009
Tired of copying and recopying files from your laptop to the office file server? Maybe you need an automated offline filesystem, such as OFS.more »
Since its addition to Kernel 2.6.28, the ext4 filesystem can be manually installed in the upcoming Ubuntu release.more »
Linux kernel developer Jonathan Corbet has just previewed the features of the upcoming Linux Kernel 2.6.29 that includes Btrfs, which he claims is the filesystem of the future.more »
Wietse Venema, the developer of Postfix, points in an advisory to a security problem in connection with the Linux and Solaris filesystems. As more recent versions of these operating systems no longer comply with the POSIX standard for links, local attackers may be able to attach files to other users' Postfix mailboxes.more »
Recovering Deleted Files Carving tools help you recover deleted filesJul 31, 2008
Modern filesystems make forensic file recovery much more difficult. Tools like Foremost and Scalpel identify data structures and carve files from a hard disk image.more »
Daniel Phillips has relaunched his Tux filesystem. After Tux2 failed due to patenting issues eight years ago, Phillips has now invited developers to collaborate on Tux3.more »
iWatch Monitoring directories with iWatchJul 10, 2008
Why wait for cron? iWatch monitors critical files and directories in realtime. This handy Perl script then notifies the user or runs a configurable command when change occurs.more »
Write Barriers Working with write barriers and journaling filesystemsJul 09, 2008
Your journaling filesystem is carefully tracking write operations – but what happens when the data gets to the disk? A write barrier request can help protect your data.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm