Linux is pretty good at harnessing processor speed, and Chastain Motorsports is hoping to snare some of that effect to propel their Panoz/Honda to victory. The distinctive Penguin logo, "Tux," has been affixed to the nose of the 200+ MPH car in anticipation of meeting a donation goal.
The opening keynote talk at the 2007 Embedded Linux Conference was given by Thomas Gleixner. Thomas has been a significant contributor to the kernel for some time; most recently, he is the force behind much of the high-resolution timer work which has been merged for 2.6.21. His experience with the embedded Linux industry has prompted him to put together a talk on how that industry works (or doesn't) with the development community. When things go badly, he says, the result is a true nightmare.
BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros -- Whax and Auditor Security Collection -- BackTrack bundles more than 300 security tools.
Daphne Chung, research manager for infrastructure and middleware software at IDC Asia-Pacific, noted that as much as 83 percent of the US$15 billion Asia-Pacific enterprise software market is now exposed to open-source software. This includes areas such as enterprise resource management applications, customer relationship management and operating systems.
This tutorial describes how to rescue data from a single hard disk that was part of a LVM2 RAID1 setup. Why is it so problematic to recover the data? Every single hard disk that formerly was a part of a LVM RAID1 setup contains all data that was stored in the RAID, but the hard disk cannot simply be mounted. First, a RAID setup must be configured for the partition(s) and then LVM must be set up to use this (these) RAID partition(s) before you will be able to mount it. I will use the Knoppix Linux LiveCD to do the data recovery.
Jailing is a mechanism to virtually change a system's root directory. By employing this method, administrators can isolate services so that they cannot access the real filesystem structure. You should run unsecured and sensitive network services in a chroot jail, because if a hacker can break into a vulnerable service he could exploit your whole system. If a service is jailed, the intruder will be able to see only what you want him to see -- that is, nothing useful. Some of the most frequent targets of attack, which therefore should be jailed, are BIND, Apache, FTP, and SSH. SSHjail is a patch for the OpenSSH daemon. It modifies two OpenSSH files (session.c and version.h) and allows you to jail your SSH service without any need for SSH reconfiguration.
An open-source engineering project is currently under development in Canada. The project aims to create a new power plant design that will use a combination of solar and geothermal energy for use in more distant locations without polluting the environment. Comprehensive coverage appears here for the first time.
The VAR Guy is choosing his words carefully for this blog entry. He doesn’t know for certain if Dell plans to pre-load Red Hat Linux on desktop PCs. But circumstantial evidence pointing to that possibility is mounting. Here are the facts.
One of the many new technologies for KDE 4 is the often mentioned, but seldom explained Solid Hardware API. Hardware has always been a bit of an annoying element of using Linux and other Unix [like] operating systems, but Solid hopes to fix that for KDE 4. In many ways, Solid is like Phonon, in that it's a Qt/KDE style API around already existing components at the lower level, such as freedesktop.org's HAL. It is already quite functional in the backend, and it's already affecting visible KDE components. Read on for more...
U.S. complaints to the WTO over commercial piracy in China will "badly damage" cooperation, China's vice premier warns.
I spent the day upgrading my new Xubuntu 6.10 (Edgy) installation to Xubuntu 7.04 (Feisty), and since Xubuntu is derived from Ubuntu, far and away the most popular Linux distribution for the desktop, I expected -- and still expect -- a lot more from it.
Virtualization, both on the software and hardware side, took center stage at the Linux/Open Source on Wall Street conference.
Recently a change in the Linux virtualization landscape has appeared with the introduction of the Kernel virtual Machine (KVM). KVM supports the virtualization of Linux guest operating systems -- even Windows with hardware that is virtualization-aware. Learn about the architecture of the Linux KVM as well as why its tight integration with the kernel may change the way you use Linux.
IBM has announced a beta version of a Linux environment that allows applications developed on Intel boxes to run on Power processor-based servers.
More than half of the 1.2 million lines of code for the real-time kernel technology have been moved into the mainline Linux kernel over the past year.
Microsoft just barely beat the clock today, responding to the European Commission's allegations it overcharges rivals for licensing its Work Group Server technology.
CentOS is an enterprise class GNU/Linux distribution based on the publicly available source packages of Red Hat Enterprise Linux. Just like RHEL or Debian stable, CentOS focuses on stability and security, sacrificing the “latest and greatest” packages. Is CentOS 5 really that stable? And does it fit on the average Joe’s desktop? This is what I’m gonna find out.
The Web is littered with blogs that are updated infrequently, at best, or completely abandoned. If you want to show your blog a little love, install ScribeFire for Firefox and get busy posting. ScribeFire puts your blog right at your fingertips in Firefox, and makes it much easier to go from thought to post.