Cloud Backup with Duplicity Data SafeNov 04, 2013
If you’re looking for a secure and portable backup technique, try combining the trusty command-line utility Duplicity with an available cloud account.more »
luckyBackup Backing up data with luckyBackupSep 21, 2012
Fully automatic and space-saving backups – that’s what luckyBackup promises. This tool combines Rsync with other techniques into one comfortable application for backing up data.more »
Perl: Clonezilla Backups Using Clonezilla and Perl scripts for backupsJun 21, 2012
Clonezilla makes backing up and restoring your system an easy affair that only involves a few key strokes. A homegrown solution reduces the time and effort to the act of slotting in a CD, on which you previously burned a Perl script.more »
Charly’s Column: S3QL The sys admin’s daily grind: S3QLNov 02, 2011
Sys admin Charly has been an enthusiastic amateur photographer for many years. Recently, he started worrying about something happening to his rapidly expanding photo collection. Can the cloud save the day?more »
OpSource introduces new managed disaster recovery service for the cloud.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
"Pandora is one of Gluster's top five deployments and offers a modern data center solution that provides flexibility, seamless growth, with 'pay as you grow' scalability," says Jack O'Brien, VP of marketing at Gluster.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm