Why is RAID So Important for Databases?
The SSD drives have already hit the market and their arena is shaping up to be fierce with a lot of players. For those who have never heard of the SSD technology, here is a brief explanation: The SSD (Solid State Drive) is another storage unit for your computer, similar to your hard drive – but zillions times faster!Yes sir, not mechanical components here, so if you look under the hood of your SSD, you won’t find any magnetic head & platters, but just a plain PCB board. Secure Erase your SSD
Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward to describe a technically advanced attack that could badly impact networks because it is tough to detect. Packet crafting is a commonly used and yet complex method to exploit vulnerabilities and, hence, it is important for network administrators to know more about it, and also to understand the various ways to protect their infrastructure against it. We will also look at how to protect FOSS-based systems from a packet crafting attack. Cyber Attacks Explained: Packet Crafting
Linux / Unix: chroot Command Examples I am a new Linux and Unix user. How do I change the root directory of a command? How do I change the root directory of a process such as web-server using a chroot command to isolate file system? How do I use a chroot to recover password or fix the damaged Linux/Unix based environment? Each process/command on Linux and Unix-like system has current working directory called root directory of a process/command.