Extended file system

Results: 65



#Item
21Malware / Computer security / Rootkits / NTFS / File system / Virtual file system / Operating system / Computer file / Extended Copy Protection / System software / Software / Computing

G Data Red Paper 2014 Uroburos Highly complex espionage software with Russian roots G Data discovers alleged intelligence agency software

Add to Reading List

Source URL: public.gdatasoftware.com

Language: English - Date: 2014-02-28 11:05:40
22Booting / Computer architecture / BIOS / Disk partitioning / Master boot record / GUID Partition Table / Extended boot record / Disk Utility / Drive letter assignment / System software / Computing / Disk file systems

Active@ Partition Manager | TOC | 2 Contents Legal Statement..................................................................................................3

Add to Reading List

Source URL: www.pcdisk.com

Language: English - Date: 2013-11-15 15:52:55
23National Security Agency / Security-Enhanced Linux / Mandatory access control / Access control / Linux Security Modules / Extended file attributes / Linux kernel / Fedora / Debian / Software / System software / Computer security

SELinux Quick Start Guide SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-01-03 14:54:00
24Tape drive / Magnetic tape data storage / Magnetic tape / VXA / Linear Tape File System / IBM System Storage / Electromagnetism / Computing / Linear Tape-Open

LTO - Big, Fast, and Cheap Unlike what many disk drive storage providers would have you believe, LTO tape is both fast and cheap when you examine all the costs associated with retaining archived data for extended period

Add to Reading List

Source URL: www.tolisgroup.com

Language: English - Date: 2015-03-17 15:05:53
25Computer architecture / Ext2 / Inode / Stat / Extended file system / File system / Symbolic link / GNU Hurd / Unix File System / Disk file systems / System software / Data management

The extended-2 lesystem overview Gadi Oxman, [removed] v0.1, August[removed]Contents

Add to Reading List

Source URL: www.osdever.net.

Language: English - Date: 2012-05-30 02:15:52
26Cluster computing / Parallel computing / OCFS / Fencing / Extended file attributes / Computer cluster / Clustered file system / Oracle RAC / Fstab / Computing / Fault-tolerant computer systems / Computer architecture

OCFS2 Best Practices Guide

Add to Reading List

Source URL: www.oracle.com

Language: English
27Filesystem permissions / Network file systems / File system / Server / Extended file attributes / Network File System / Computing / Data / Information

Center for Information Technology Integration Report to PolyServe, Inc. NFSv4 for Parallel File Systems September 2004

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2004-11-19 14:18:12
28Booting / Computer architecture / BIOS / Disk partitioning / Master boot record / GUID Partition Table / Extended boot record / Disk Utility / Drive letter assignment / System software / Computing / Disk file systems

Active@ Partition Manager | TOC | 2 Contents Legal Statement..................................................................................................3

Add to Reading List

Source URL: pcdisk.com

Language: English - Date: 2013-11-15 15:52:55
29Unix / File system / Extended file attributes / Filesystem Hierarchy Standard / Virtual file system / Mount / Rm / Disk file systems / GoboLinux / System software / Computing / Data management

A virtual filesystem on steroids: Mount anything, index and search it Ben Martin September, 2005 Abstract This paper describes the libferris virtual filesystem. Coverage includes the

Add to Reading List

Source URL: witme.sourceforge.net

Language: English - Date: 2006-11-13 20:44:51
30Mac OS X / Mac OS / Unix / File managers / Computer data / Hidden file and hidden directory / Finder / Extended file attributes / Attrib / Computing / Software / System software

1 Applying “Covering the Tracks” from SANS Course SEC 504, Hacker Techniques, Exploits, and Incident Handling, to Mac OS X. 2

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
UPDATE