At Rectiphy, innovation goes beyond the spelling of the company name to include its new technology—that is, the company's ActiveImage Protector Linux Edition. The product is a disk-imaging backup technology for Linux environments that incorporates Rectiphy's Smart Sector snapshot technology, which the company says speeds up backups and reduces disk storage space in Ext2/Ext3/Ext4 formats. Support for the Linux-native snapshot driver enables users to create a full backup of the Linux server HD or volume without shutting down the OS. Bare-metal recovery is supported, as well as retrieval of individual files from the backup image.
Few things will burnish your hard-core technorati credentials like learning the classic document markup language LaTeX and its typesetting companion program TeX. The tools are used for creating scientific and technical documents. Get up to speed fast with Stefan Kottwitz's LaTeX Beginner's Guide, a new book that helps new users overcome LaTeX's relatively steep learning curve and leverage its powerful features. Readers learn to typeset documents containing tables, figures, formulas and common book elements like bibliographies, glossaries and indexes. Additional topics include management of complex documents and the latest fonts and PDF-related features. A great deal of the book is dedicated to one of LaTeX's most powerful features: the designing of complex math formulas and other expressions.
Syngress describes Cory Altheide and Harlan Carvey's new book Digital Forensics with Open Source Tools as “digital forensics, MacGyver style.” Unfortunately for the 1980s TV hero MacGyver, his toolset predated open source. But thanks to Altheide and Carvey, you have all the open-source forensics tools at your disposal for investigating Linux, Mac and Windows systems, complete with guidance. Topics include the open-source examination platform, disk and filesystem analysis, system-specific issues and artifacts, Internet-related artifacts, file analysis, automating analysis and more. The appendix goes into detail on particularly useful open-source tools.
The team at Xelltec categorizes it new Xelltec Integrated Security System (XISSYS) as “revolutionary” because it enables users “to remotely track and protect their laptops and handheld devices”. The patent-pending XISSYS microchip is an embedded security solution designed to allow users to disable or find a stolen laptop, smartphone, or other mobile device easily. This prevents thieves from gaining access to sensitive data. The microchip can wipe out data, or it can destroy the mobile device physically with a high-frequency voltage so that it is completely inoperable. Furthermore, if the user needs the data that is on the mobile device, it can be copied remotely from the device to a server before the data is destroyed. The microchip also acts as a tracking device, enabling the owner to find the physical location of the stolen device. Xelltec is seeking strategic alliances with popular main board and computer manufacturing companies worldwide.
If you deploy the new Napatech Software Suite for your network appliance development, the company says you'll need to develop its application software only once and then simply decide which network adapter combination works best in the particular deployment. Besides this flexibility, the suite offers critical functionality that can accelerate performance of network appliances. Both a hardware abstraction and streamlined API are provided, allowing network appliance vendors to take advantage of Napatech's full range of intelligent network adapters quickly and easily. Hardware abstraction allows multiple intelligent network adapters of different types to be combined on a plug-and-play basis in a standard server platform. The same feature set can be offered independent of the port speed. A number of open-source software applications, such as Suricata, Snort and Ostinato are supported.
James Gray is Products Editor for Linux Journal
Webinar: 8 Signs You’re Beyond Cron
11am CDT, April 29th
Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.Join us!
- New Products
- Not So Dynamic Updates
- Users, Permissions and Multitenant Sites
- Flexible Access Control with Squid Proxy
- Security in Three Ds: Detect, Decide and Deny
- Tighten Up SSH
- DevOps: Everything You Need to Know
- Solving ODEs on Linux
- Non-Linux FOSS: MenuMeters
- Android Candy: Bluetooth Auto Connect