13%
14.08.2017
storage is handled by the almost venerable ext3. The use of BusyBox [11] for most executable programs and of Dropbear [12] as the SSH daemon is the logical consequence of the Buildroot underpinnings
13%
02.06.2020
is still in transition, so you'll see both product names mentioned throughout this article. Adding to the confusion, Palo Alto Networks offers two similarly named products [2]: the software-as-a-service (SaaS
13%
01.08.2019
OS virtual machine (VM). Photon OS [6] is a specialized small Linux built for Docker, Kubernetes, and security.
A Photon VM is about 150MB on disk: Photon runs on VMware, as well as Amazon and Azure
13%
18.07.2013
files from 1991 on my system and files from the late 1980s on floppy disks (once a pack rat, always a pack rat).
With the second approach – doing the migration for the users – migrating data takes a bit
13%
10.06.2015
these web-free applications a "digital environment" or "offline business data." A quote from the Analytics Academy, Lesson 1.2, says: "You can even use Google Analytics in really creative ways to collect
13%
16.05.2013
the approach introduced by Canonical with Ubuntu 12.10, in which only the bootloaders, but not the kernel, are signed.
Compared with Canonical's approach, which only ensures that Ubuntu will start on Windows 8
13%
30.04.2013
forensic analysis application.
Memory Dumping
Current kernel versions restrict access to the Linux system’s main memory. In the past, you could use two device drivers, /dev/mem
and /dev/kmem
, to read
13%
30.11.2025
the Ubuntu Precise (12.04) Universe repository and as a package for Debian Sid.
To install the server on Linux, you first need to install the necessary packages; the example here uses an Ubuntu distribution
13%
09.10.2017
volumes that also contain the respective filesystems. The smallest units of a logical volume system are the physical extents (4MB by default), which are comparable to sectors in classical partitioning
13%
05.02.2023
and recommendations come in. Examples include:
Microsoft security baselines from the Microsoft Security Compliance Toolkit [4]
SiSyPHuS, a study of system design, logging, hardening, and security features