Role-based access control in SELinux
http://www.ibm.com/developerworks/linux/library/l-rbac-selinux/?S_TACT=105AGX99&S_CMP=CP example how to configure access using SELinux on Fedora 8
http://www.ibm.com/developerworks/linux/library/l-rbac-selinux/?S_TACT=105AGX99&S_CMP=CP example how to configure access using SELinux on Fedora 8
http://blog.unixstyle.ru/index.php?/archives/23-cryptoloop-losetup,-dm-crypt-cryptsetup,-dm-crypt-LUKS-cryptsetup;-AES-vs-blowfish.html linux disc encryption method – raw speed benchmarks
http://www.softwareprojects.com/resources/programming/t-i-can-make-your-site-run-10-times-faster-1462.html nice summary for the above
https://strikecenter.bpointsys.com/articles/2008/02/13/exploiting-iis-via-htmlencode-ms08-006 interesting patch analisys article, shows how to dig up vulns from patches
http://www.ibm.com/developerworks/linux/library/l-scalability/index.html?S_TACT=105AGX01&S_CMP=LP number of benchmarks of linux networking on SMP servers, with some tuning suggestions.
http://www.psc.edu/networking/projects/hpn-ssh/ interesting analysis about network performance
http://hypertable.org/ new project that tries to do open source “BigTable” implementation
http://www.linux.com/feature/125322 small tools to rsync encrypted files
http://www.opennet.ru/opennews/art.shtml?num=13909 postgresql top and other similar monitoring tools for mysql, linux io, etc
http://www.redhatmagazine.com/2008/01/22/tips-from-an-rhce-visualizing-audit-logs-with-mkbar/ how to get pretty graph from log/audit