You are here |
current.workingdirectory.net | ||
| | | |
sookocheff.com
|
|
| | | | I've been searching for a way to reliably monitor a RAID array. I found a few resources and decided to compile them in one post. If you are running Ubuntu Server skip to the bottom for some good news. | |
| | | |
wejn.org
|
|
| | | | This article explains how to install Alpine Linux on a Supermicro server, with a fully encrypted filesystems (yes, including /boot) and harden the boot sequence against an evil maid attack. | |
| | | |
makedist.com
|
|
| | | | An experiment using iSER and software RAID to build a large network-backed RAM disk. | |
| | | |
techdirectarchive.com
|
|
| | When Should I Use TPM or TPM + PIN: TPM is a microprocessor designed to perform basic security operations such as encryption key management |