At Rectiphy, innovation goes beyond the spelling of the company name to include its new technology—that is, the company's ActiveImage Protector Linux Edition. The product is a disk-imaging backup technology for Linux environments that incorporates Rectiphy's Smart Sector snapshot technology, which the company says speeds up backups and reduces disk storage space in Ext2/Ext3/Ext4 formats. Support for the Linux-native snapshot driver enables users to create a full backup of the Linux server HD or volume without shutting down the OS. Bare-metal recovery is supported, as well as retrieval of individual files from the backup image.
Few things will burnish your hard-core technorati credentials like learning the classic document markup language LaTeX and its typesetting companion program TeX. The tools are used for creating scientific and technical documents. Get up to speed fast with Stefan Kottwitz's LaTeX Beginner's Guide, a new book that helps new users overcome LaTeX's relatively steep learning curve and leverage its powerful features. Readers learn to typeset documents containing tables, figures, formulas and common book elements like bibliographies, glossaries and indexes. Additional topics include management of complex documents and the latest fonts and PDF-related features. A great deal of the book is dedicated to one of LaTeX's most powerful features: the designing of complex math formulas and other expressions.
Syngress describes Cory Altheide and Harlan Carvey's new book Digital Forensics with Open Source Tools as “digital forensics, MacGyver style.” Unfortunately for the 1980s TV hero MacGyver, his toolset predated open source. But thanks to Altheide and Carvey, you have all the open-source forensics tools at your disposal for investigating Linux, Mac and Windows systems, complete with guidance. Topics include the open-source examination platform, disk and filesystem analysis, system-specific issues and artifacts, Internet-related artifacts, file analysis, automating analysis and more. The appendix goes into detail on particularly useful open-source tools.
The team at Xelltec categorizes it new Xelltec Integrated Security System (XISSYS) as “revolutionary” because it enables users “to remotely track and protect their laptops and handheld devices”. The patent-pending XISSYS microchip is an embedded security solution designed to allow users to disable or find a stolen laptop, smartphone, or other mobile device easily. This prevents thieves from gaining access to sensitive data. The microchip can wipe out data, or it can destroy the mobile device physically with a high-frequency voltage so that it is completely inoperable. Furthermore, if the user needs the data that is on the mobile device, it can be copied remotely from the device to a server before the data is destroyed. The microchip also acts as a tracking device, enabling the owner to find the physical location of the stolen device. Xelltec is seeking strategic alliances with popular main board and computer manufacturing companies worldwide.
If you deploy the new Napatech Software Suite for your network appliance development, the company says you'll need to develop its application software only once and then simply decide which network adapter combination works best in the particular deployment. Besides this flexibility, the suite offers critical functionality that can accelerate performance of network appliances. Both a hardware abstraction and streamlined API are provided, allowing network appliance vendors to take advantage of Napatech's full range of intelligent network adapters quickly and easily. Hardware abstraction allows multiple intelligent network adapters of different types to be combined on a plug-and-play basis in a standard server platform. The same feature set can be offered independent of the port speed. A number of open-source software applications, such as Suricata, Snort and Ostinato are supported.
James Gray is Products Editor for Linux Journal
|PostgreSQL, the NoSQL Database||Jan 29, 2015|
|HPC Cluster Grant Accepting Applications!||Jan 28, 2015|
|Sharing Admin Privileges for Many Hosts Securely||Jan 28, 2015|
|Red Hat Enterprise Linux 7.1 beta available on IBM Power Platform||Jan 23, 2015|
|Designing with Linux||Jan 22, 2015|
|Wondershaper—QOS in a Pinch||Jan 21, 2015|
- PostgreSQL, the NoSQL Database
- Sharing Admin Privileges for Many Hosts Securely
- HPC Cluster Grant Accepting Applications!
- Designing with Linux
- Wondershaper—QOS in a Pinch
- January 2015 Issue of Linux Journal: Security
- Internet of Things Blows Away CES, and it May Be Hunting for YOU Next
- Ideal Backups with zbackup
- Red Hat Enterprise Linux 7.1 beta available on IBM Power Platform
- Slow System? iotop Is Your Friend
Editorial Advisory Panel
Thank you to our 2014 Editorial Advisors!
- Jeff Parent
- Brad Baillio
- Nick Baronian
- Steve Case
- Chadalavada Kalyana
- Caleb Cullen
- Keir Davis
- Michael Eager
- Nick Faltys
- Dennis Frey
- Philip Jacob
- Jay Kruizenga
- Steve Marquez
- Dave McAllister
- Craig Oda
- Mike Roberts
- Chris Stark
- Patrick Swartz
- David Lynch
- Alicia Gibb
- Thomas Quinlan
- Carson McDonald
- Kristen Shoemaker
- Charnell Luchich
- James Walker
- Victor Gregorio
- Hari Boukis
- Brian Conner
- David Lane