• RHEL 7 roadmap reveals Linux container advancements, Docker integration

    Red hat Enterprise Linux 7 brings forth Project Atomic, kernel improvements, deeper Windows Active Directory integration and simplicity.

    Meredith Courtemanche1,155 pointsBadges:
  • Compare popular Linux distributions for servers

    If you're running a Linux OS on enterprise servers, support matters. When it comes to popular Linux distributions, a little research goes a long way.

    svanvugt865 pointsBadges:
  • Windows-to-Linux desktop migration tips: Why to switch, how to plan

    Versora CTO Jon Walker provides the why and how of migration from Windows to Linux. Why, in a nutshell: Better technology.

    Jan Stafford2,950 pointsBadges:
  • Mount file system Linux systemd’s way

    Forget about /etc/fstab and autofs. There's a new Linux system around. Systemd manages mounting and automounting of file systems differently.

    svanvugt865 pointsBadges:
  • Backing up the Linux master boot record

    The Linux master boot record (MBR) contains GRUB and the partition table, and to avoid crippling boot errors, it is a good idea to make a backup of it. Learn how to backup the MBR and how this effort can pay off when troubleshooting a Linux boot problem.

    svanvugt865 pointsBadges:
  • Cumulus Linux 2.5 adds mainstream L2 features to bare-metal switching

    Cumulus Networks releases validated design guides and Cumulus Linux 2.5, with more Layer 2 features for mainstream data centers.

    Shamus McGillicuddy5,330 pointsBadges:
  • Create a SAN with the Linux LIO iSCSI target

    With the LIO iSCSI target service, Linux shops have an affordable SAN option that ranks up there with expensive proprietary storage solutions.

    svanvugt865 pointsBadges:
  • Five urban legends that scare a Linux beginner

    The Linux server platform is fundamentally open. Admins migrating from Unix will run into a lot of misinformation when they start out.

    ITKE351,865 pointsBadges:
  • Hand of Thief

    Hand of Thief is banking crimeware that targets Linux operating systems. The Hand of Thief uses a form grabber to steal IDs, passwords and other information pertaining to Internet banking.

    ITKE351,865 pointsBadges:
  • Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

    In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system.

    ITKE351,865 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following