LVM configuration on Fedora 13
Fedora is one of a handful of Linux distributions that adopts the Linux Logical Volume Manager...
Read MoreMay 27, 2010 | Fedora, Tutorials/Tips
Fedora is one of a handful of Linux distributions that adopts the Linux Logical Volume Manager...
Read MoreWe are in the middle of another release cycle. Folks in the community are updating their systems,...
Read MoreMay 26, 2010 | Mint, Tutorials/Tips, Ubuntu
The installation program on Ubuntu 10.04 and Linux Mint 9 are the same. And that’s because...
Read MoreMay 26, 2010 | Mint, Tutorials/Tips, Ubuntu
In some situations, you may want to install more than one operating system on a computer. One...
Read MoreMay 24, 2010 | Tutorials/Tips, Ubuntu
When installing Ubuntu, you are required to create one user account. That account is the...
Read MoreMay 24, 2010 | Tutorials/Tips, Ubuntu
It’s been almost a month since Ubuntu 10.04 was released. I’m not a fan of Ubuntu, but...
Read MoreApr 21, 2010 | ClearOS
In reviewing a Linux or BSD distribution, I try as much as possible to list all of the...
Read MoreApr 19, 2010 | Fedora, Tutorials/Tips
Fedora 13 Beta has just been released for testing and bug reporting, with the stable version...
Read MoreApr 18, 2010 | Sabayon, Tutorials/Tips
Disk encryption is one of five methods you can use to enhance the physical security posture of...
Read MoreApr 16, 2010 | Firewall and Router
ClearOS is a Linux distribution derived from RedHat and CentOS. Formerly known as Clark Connect,...
Read MoreClearOS is a network and gateway server distribution derived from RedHat and CentOS. Formerly...
Read MoreApr 3, 2010 | Privacy and Licensing
A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license...
Read MoreApr 1, 2010 | Applications
Adobe’s Flash Player has come under fire from developers and companies who question its...
Read MoreToday’s smart phones have all the speed, storage, and network connectivity of desktop...
Read MoreMar 24, 2010 | Privacy and Licensing
For several years, it has been a poorly kept secret that any Web site you went to could secretly...
Read MoreMar 24, 2010 | Security
A British computer hacker equipped with a “Dummies” guide recently tapped into the...
Read More