eBook: User Mode Linux
Posted on 21 July 2014.
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels.


You can try out new distributions, experiment with buggy software, and even test security. The author covers everything from getting started through running enterprise-class User Mode Linux servers.

Coverage includes:
  • What User Mode Linux is, how it works, and its uses in Linux networks
  • Key applications, including server consolidation, development, and disaster recovery
  • Booting and exploration: logins, consoles, swap space, partitioned disks, and more
  • Copy-On-Write (COW): UML's efficient approach to storing filesystem changes
  • In-depth discussion of User Mode Linux networking and security
  • Centrally managing User Mode Linux instances, and controlling their hardware resources
  • Implementing clusters and other specialized configurations
  • Setting up User Mode Linux servers, step-by-step: small-scale and large-scale examples
  • The future of virtualization and User Mode Linux.





Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //