This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
This white paper will help you learn how you can create a solid foundation for a purpose-built database deployment that can allow you greater query deployment at lower costs. Read on to learn more.
Learn how leading provider of global technology operations management services, Cybernet-SlashSupport (CSS), migrated to Red Hat Enterprise Linux® from Microsoft Windows and dramatically improved application performance and improved productivity while freeing up IT resources.
When it comes to IT, Linux is everywhere. From smart phones to powerful computer systems, this flexible operating system addresses a significant number of usage models. Read this white paper to learn more about the universal platform and discover all the computer segments that it plays a role in.