USB sticks and SD cards quickly lose their value, but if a script distributes the data across several such devices, flash memory is still useful as a fast and shockproof backup medium despite limited capacity.
KDE SC 4.10 was released six months after KDE 4.9, adding many new features. In the background, work is in full swing for the next generation, KDE Frameworks 5: a KDE based completely on Qt5 and QML.
Dynamic resource allocation and migration of virtual machines between hosts mean that VMware environments pose new monitoring challenges. A new version of the free OpenNMS network management tool now includes an option for monitoring VMware-based infrastructures.
We look at what makes a security issue critical and how upstream developers and vendors respond by examining three incidents: CVE-2013-0156, CVE-2013-0333, and rubygems.org. Moreover, we look at improvements that can make security better in the future โ specifically, incident response handling.
In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping options on Linux and introduce the support in Linux for the Volatility Analysis Framework.
Thanks to protocols such as UPnP and DLNA, video, audio, and photos are distributed to TVs, gaming consoles, PCs, and smartphones without the need for configuration. Linux as a central media server is a welcome guest.
A Perl script calls various plugins that sniff around on FTP and HTTP servers run by the major Linux distributions to discover when Fedora, Debian, and other distros update their packages.
Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural โ that is, in its configuration.
The market for good image editing programs for Linux is pretty much saturated. Despite this, BrainDistrict has dared to launch two commercial programs: IFX-Supreme and PaintSupreme.
During the ongoing battle against spam, admins should inspect their troop's battle lines from time to time. If you don't relish the thought of counting the dinnerware, you can use the services of a logfile inspector like SendmailAnalyzer, which works surprisingly well with Postfix and the like.