Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality

Yum in Redhat Enterprise Linux 6.1

Editor: This post is by James Antill. It looks at yum, the command line tool for managing applications on certain RPM-based Linux distributions like Redhat Enterprise Linux and Fedora. Time to look at a few features of yum in RHEL-6.1 now that it’s released: Search is more user-friendly – As we maintain yum we are always looking for the “minor” […]

Systemd for Developers

Systemd not only brings improvements for administrators and users, it also brings a (small) number of new APIs with it. In this blog story (which might become the first of a series) I hope to shed some light on one of the most important new APIs in systemd: Socket Activation – In the original blog story about systemd I tried […]

Hardware Encryption Developed for New Computer Memory Technology

Security concerns are one of the key obstacles to the adoption of new non-volatile main memory (NVMM) technology in next-generation computers, which would improve computer start times and boost memory capacity. But now researchers from North Carolina State University have developed new encryption hardware for use with NVMM to protect personal information and other data. NVMM technologies, such as phase-change […]

Android Vulnerability: Use Precaution on Public WiFi

Yesterday, researchers from Germany’s University of Ulm reported that some Android applications transmit sensitive authentication data without properly securing it, making people vulnerable to having their private data (e.g. Calendar Contacts, Pictures) accessed by an attacker. When a vulnerable device transmits its authentication data, an attacker can eavesdrop and view transmitted data if you are connected to a public WiFi […]

Top 10 upcoming Android tablets

Contrary to popular belief, the iPad 2 isn’t the only tablet computer in the world. Yes, it is rather wonderful, and the game support is staggering, but there are still some niggling issues that take the shine off the supremely shiny device. Consider the bizarre lack of Flash support, which creates a distinctly web 1.0 browsing experience, or the upscaled […]

Manual disk partitioning guide for Kubuntu 11.04

Manual disk partitioning guide for Kubuntu 11.04

Like the Ubuntu 11.04 installer, the Kubuntu 11.04 installation program configures just two partitions by default. These are for /, the root directory, and Swap, disk space for use as virtual memory. To make upgrades less tasking, it is recommended that a separate partition be created for /home, the directory where your home folder will be located. This article presents […]

Astaro has been acquired by Sophos

Astaro, the German company behind the suite of Linux-based network and host-based security applications and devices, has been acquired by Sophos, a UK-based provider of enterprise network and endpoint security solutions. An email to that effect was sent to Astaro’s users and partners today. Excerpts from the email reads: Dear Astaro Customers and Users, In 2009 we began to expand […]

10 Reasons for Developers to Love HP webOS

There comes a time in a Linux-loving geek’s life when he or she needs a new challenge. Making desktop apps isn’t hacking it anymore and building yet-another-website seems passe. If you want to jump into the world of mobile, here are a few reasons why HP webOS is the platform for you. 1: It’s free – There’s no cost to […]

U.S. To Introduce Draconian Anti-Piracy Censorship Bill

The U.S. Government is determined to put an end to online piracy. In an attempt to give copyright holders and the authorities all the tools required to disable access to so-called rogue sites, lawmakers will soon introduce the PROTECT IP Act. Through domain seizures, ISP blockades, search engine censorship, and cutting funding of allegedly copyright infringing websites, the bill takes […]

How to install Ubuntu 11.04 on an encrypted LVM file system

How to install Ubuntu 11.04 on an encrypted LVM file system

Ubuntu is one of many Linux distributions with support for LVM, the Linux Logical Volume Manager. LVM is a disk partitioning scheme that brings a level of flexibility to disk management that is not possible with the traditional method. With LVM, you can, if necessary, increase the size of a partition online, that is, while the system is running, without […]

Why security standards are Critical for the Cloud

Everyone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the lessons of the critical value of standards needs to be relearned. While it […]

Home directory and full disk encryption in Ubuntu 11.04

Home directory and full disk encryption in Ubuntu 11.04

Disk encryption is one of several security features built into the Linux kernel that you may use to enhance the physical security rating and posture of a Linux installation. Disk encryption used to be widely recommended for notebook computers, and the reason is such mobile computers are more likely to be stolen than a desktop or server in a home […]

Why We Need An Open Wireless Movement

If you sometimes find yourself needing an open wireless network in order to check your email from a car, a street corner, or a park, you may have noticed that they’re getting harder to find. Stories like the one over the weekend about a bunch of police breaking down an innocent man’s door because he happened to leave his network […]

How to install Ubuntu 11.04 on a btrfs file system

How to install Ubuntu 11.04 on a btrfs file system

The default journaling file system on non-boot partitions on Ubuntu 11.04 is ext4. Other journaling file systems supported are ext3, xfs, jfs, reiserfs, and btrfs. The journaling file system of interest in this article is btrfs, the B-Tree File System. Btrfs is an ongoing attempt to create a ZFS-like file system for Linux. It is still a long way from […]

Manual disk partitioning guide for Ubuntu 11.04

Manual disk partitioning guide for Ubuntu 11.04

Advanced or manual disk partitioning is available for those that want to create a custom set of partitions for installing Ubuntu 11.04. For whatever reason or reasons you choose to use the advanced disk partitioning tool, this article gives a step by step guide, with detailed explanations, on how to do it. This tutorial assumes that you are going to […]

Copyright Is Like QWERTY: Locked-In and Retrospective

The term ‘path dependence’ is generally used to describe the development of technological standards and how they ‘lock in’ a given technical solution. The QWERTY keyboard is often given as an example of path dependence – the fact that the costs of changing the keyboard to a better, more efficient solution, hinders change. The same can be said about much […]

How to dual-boot Linux Mint Debian Edition and Windows 7

How to dual-boot Linux Mint Debian Edition and Windows 7

This is the latest article in the series on dual-booting Linux and BSD desktop distributions with Windows 7. And this one provides step-by-step directions on how to dual-boot Linux Mint Debian Edition (LMDE) with Windows 7 on a computer with a single hard drive. LMDE is the branch of Linux Mint that is based on Debian, rather than on Ubuntu. […]

No, iPhone location tracking isn’t harmless and here’s why

It didn’t take long for the blogosphere to respond to research presented on Wednesday that detailed a file in Apple iPhones and iPads unknown to the vast majority of its users that stored a long list of their time-stamped locations, sometimes with alarming detail. On Thursday, a forensics expert who sells software to law enforcement agencies gave a first-hand account […]

How to disabling Geo-Tagging on your phone

The storage of location based data, in the form of Latitude and Longitude inside of images is called Geotagging; essentially tagging your photograph with the geographic location. This data is stored inside if the metadata if JPEG images and is useful for tying the photograph to a location. Want to remember exactly where you took those photographs while on vacation? […]

How People Broadcast Their Locations Without Meaning To

Smart phones include geotagging features that many people aren’t aware of. People were up in arms this week about the privacy implications of news that the iPhone gathers location information and stores it in a file on the user’s computer. But experts say that smart-phone owners are unknowingly taking a much bigger risk with information about where they go all […]