Fight ransomware: Run Windows in Linux as a virtual machine Running Windows as a virtual machine in Linux may seems like unnecessary work until something like the Wannacry ransomware scare comes along.  Despite its headaches, desktop Linux rarely is the target of malware. (When it is, it can generally present a smaller attack surface.)  And if you need to run applications in Windows, run

It takes more than a Circuit Breaker to create a resilient application – RHD Blog Topics such as application resiliency, self-healing, antifragility are area of interest for many. This article is trying to distinguish, define, and visualize these concepts, and create solutions with these characteristics. So what does a typical resiliency pitch look like: use timeouts, isolate in bulkheads, and of course apply the circuit breaker pattern. I agree with all

Managing passwords and security on your Linux server | Managing password and security related issues in Linux is important, but there are some simple steps you can take to make your system more secure.  We’ve seen that there can be a large number of attempts to log on to a publicly accessible system. So, what can we do? There are a few things

Automotive Grade Linux Looks Forward to Daring Dab and Electric Eel in 2017 | Linux Foundation’s Automotive Grade Linux (AGL) project understands the challenges of herding the car industry toward a common, open source computing standard. At the recent Embedded Linux Conference, Miner provided an AGL update and summarized AGL’s Yocto Project based Unified Code Base (UCB) for automotive infotainment, including the recent UCB 3.0 “Charming Chinook” release.

Converting traditional sysV init scripts to systemd There is trend with many Linux distributions that old well known init system is replaced with systemd. It very different system that uses different techniques and scripts. This article gives tips how to convert a SysV init script to a systemd unit file.  It is useful to know how to use both systems, because everything will not

7 considerations to make when securing your Raspberry Pi  This article tries to get you thinking of security at an appropriate level for your Raspberry Pi and IoT projects without scaring you away from playing, experimenting, and innovating. It’s about striking a balance. Don’t let a challenge stop you from trying. Just be aware of the big picture for securing your projects.

Top Linux distros for computer repair | This article takes a look at five different Linux distributions designed to make your life easier when computers start giving you a headache. Give them a try, and make sure you keep CDs or USB drives with your favorites handy for when something does go wrong.