Cloud Management Tools
Cloud computing is designed to harness the power of networks of computers and communications in a cost effective way.
Console Based Network 'top' Tools
The purpose of this article is to identify small console based utilities that show network usage in a way reminiscent to what the top utility does for processes.
Disk Encryption Tools
Disk encryption is one method to help minimise the risks by preventing unauthorised access to data storage, to ensure safe information exchanges, safeguard against data leakage, and manage compliance.
IaaS Software offering a real alternative to commercial clouds
Infrastructure as a Service (IaaS) is a service model where an organization outsources the equipment used to support storage, hardware, servers and networking components.
One of the essential tools in hardening a computer system or network is to use access controls such as Mandatory Access Control (MAC) or Role-Based Access Control (RBAC).
More Monitoring Tools
To provide an insight into the quality of software available for Linux, we have compiled a list of 6 more of the best free monitoring tools. Hopefully, there will be something of interest here for anyone who needs to monitor servers, devices, and ensure that a computing system maintains high performance.
Network Authentication Servers
To provide an insight into the quality of software that is available, we have compiled a list of 4 excellent network authentication servers. Hopefully, there will be something of interest here for educational institutions, internet service providers, and other commercial organisations.
PaaS Cloud Computing Stacks That Pack a Punch
Platform as a Service (PaaS) is a category of cloud computing services which offers a way to support the complete lifecycle of delivering web applications and services via the cloud. Along with Software as a Service (SaaS) and Infrastructure as a Service (IaaS), PaaS is a service model of cloud computing.
Remote Display Software
?Remote Desktop Control displays the screen of another computer (via Internet or local area network) on a local screen. This type of software enables users to use the mouse and keyboard to control the other computer remotely. It means that a user can work on a remote computer as if he or she was sitting directly in front of it, regardless of the distance between the computers.
The aim of this article is to provide the user with a starting point for improving the security of a Linux machine. Basic system security (e.g. having a regular backup strategy, using hard-to-guess passwords, removing services that you don't need) is essential administration in protecting your data. But you need a more sophisticated approach to keep intruders out.
System Monitoring Tools
To provide an insight into the quality of software that is available, we have compiled a list of 9 Linux system monitoring tools. Hopefully, there will be something of interest here for anyone who wants to monitor a specific service or situation.
Type 1 Open Source Hypervisors and More
This article identifies the finest open source Type 1 hypervisors that are available to download without charge. We also look at Linux kernel virtualization hypervisors.