Captive NTFS Accessing partitions on dual-boot systemsJul 31, 2005
Why reboot every time you need to access data on the other side of your dual boot system? We’ll introduce you to Captive NTFS – a free tool for reaching Windows NTFS partitions from Linux. We’ll also show you some handy tools for reading Linux partitions from Windows.more »
Configuring Dual Boot Putting Linux and Windows on a single hard diskJul 31, 2005
When two systems share a single computer, a boot manager handles the prompts that determine which system to boot. We’ll show you several multiple boot scenarios and describe how to set up your system for dual booting Linux with Windows.more »
Charly's Column The Sysadmin’s Daily Grind: RsnapshotMar 31, 2005
The principle behind Rsnapshot is nothing new: use Rsync and SSH to back up files to another computer. What sets Rsnapshot apart is its simple setup and its rich collection of features.more »
Admin Workshop: Finding Files Insider Tips:F ind and LocateJan 31, 2005
Modern computers with their multiple Gigabyte hard disks store thousands of files. A lost file can cause a lot of work,and it can also pose a security risk. Fortunately,Linux has some versatile tools for finding those “lost files.”more »
Memory Stick Linux Booting Linux from a USB Memory StickJan 31, 2005
Everyone knows you can boot Linux from a live CD,but have you thought about putting Linux on a compact and highly portable USB memory stick?more »
Go Wireless Intro Wireless Networking in LinuxJan 31, 2005
When you’re going wireless,it pays to be careful. Get the right hardware,and make sure your network is as secure as you think it is.more »
Software Suspend Working with Software SuspendDec 31, 2004
Nearly all motherboards have a power management feature designed to power down the computer and put it into suspend mode. In real life, this feature does not always work. Linux has a software-based workaround for the dysfunctional suspend.more »
Shorewall Configuring Netfilter/iptables with ShorewallDec 31, 2004
When users think about their workstations at home, they often forget about security. But danger is out there,waiting to pounce on the unsuspecting. Shorewall helps everyday Linux users keep the intruders away.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.