New tool will look like GParted but support a wider range of storage technologies.more »
Hide Cloud Data from the Cloud Vendor Secure Storage with Tahoe-LAFSMay 20, 2014
Innovative project offers cloud storage with the "Principle of Least Authority."more »
Inktank and SUSE are partnering to provide enterprise-grade support for the Ceph Distributed Storage System as part of SUSE Cloud.more »
KVM Storage More KVM performance thanks to an optimized disk configurationJul 24, 2012
KVM has many ways to map virtual disks on the host system. The appropriate choice of disk format has an effect not only on the speed of I/O operations but also on snapshots and backups.more »
Ext2Fsd Accessing Linux filesystems from Windows with Ext2FsdJun 21, 2012
Sure you can access Windows partitions from Linux. But what if you want to connect to your Linux partitions from Windows? Ext2Fsd offers an easy solution.more »
Ask Klaus! Klaus Knopper answers your Linux questionsJun 21, 2012
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
Dell and Red Hat Launch OEM Solutions group for integrated hardware/software solutions.more »
Charly’s Column: S3QL The sys admin’s daily grind: S3QLNov 02, 2011
Sys admin Charly has been an enthusiastic amateur photographer for many years. Recently, he started worrying about something happening to his rapidly expanding photo collection. Can the cloud save the day?more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm