Home Search

lin - search results

If you're not happy with the results, please do another search

How to Manage Btrfs Storage Pools, Subvolumes And Snapshots on Linux (part 1)

Before we dive into using Btrfs, how is it pronounced? Lots of ways, like Bee Tree Eff Ess and Bee Tee Arr Eff Ess....

Android-x86 Just Might Make a Good Linux Desktop Alternative

Working with the Android OS on a desktop computer environment takes personal computing in a new direction. How many will follow it remains to...

Troubleshooting Ubuntu One Cloud Storage on Linux

Update: Ubuntu One will no longer be available as of June 1, 2014 and all data will be wiped July 31, 2014. Here are three...

Docker Begins Straddling Free and Paid Services

Here at OStatic, we're big fans of Docker, and we've been following recent developments surrounding it, including Red Hat starting to offer certification for...

Full-Disclosure Security Mailing List Shuts Down

Once on the cutting edge of vulnerability disclosure, Full-Disclosure has become too unpleasant to read or moderate.Read more at Enterprise Open Source Toolkit

Linux Worm Darlloz Targets Intel Architecture to Mine Digital Currency

A new variant of the Darlloz worm focuses on manipulating home systems to mine for digital currency beyond Bitcoin.Read more at Enterprise Open Source...

“Cryogenic” Linux Kernel Drops Power Use

Announced today was the "Cryogenic" module for the Linux kernel that claims to lower power consumption of Linux systems...Read more at Phoronix

Linux-Based Telepresence Robot Navigates Autonomously

iRobot has begun shipping a Linux-based telepresence robot, featuring a 21-inch videoconferencing screen and camera, and autonomous navigation via LIDAR. iRobot announced its Ava...

Difference Between su Vs sudo and How to Configure sudo in Linux

Linux System is much secured than any of its counterpart. One of the way to implement security in Linux is the user management policy...

Risk Assessment / Security & Hacktivism 10,000 Linux servers hit by malware serving tsunami...

Researchers have documented an ongoing criminal operation infecting more than 10,000 Unix and Linux servers with malware that sends spam and redirects end users...