Through the years, I have settled on maintaining my sensitive data in plain-text files that I then encrypt asymmetrically. Although I take care to harden my system and encrypt partitions with LUKS...
In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for...
Containers can be considered the third wave in service provision after physical boxes (the first wave) and virtual machines (the second wave). Instead of working with complete servers (hardware or...

Where's That Pesky Hidden Word?

I've been promising my 11-year-old for a long time now that I'd write a program that would let you build custom word searches based on a list of words given by the user. I wrote one years and years ago in C, but since I can't find that code any more and wanted to tackle another interesting project for this column, that's what I'm going to look at herein. more>>

A Project to Guarantee Better Security for Open-Source Projects

With many open-source projects built on top of others, a security weakness in a common piece of infrastructure can have far-reaching consequences. As OpenSSL's Heartbleed security hole demonstrated, these vulnerabilities can appear in even the most trusted packages. more>>

My Network Go-Bag

I often get teased for taking so much tech hardware with me on trips—right up until the Wi-Fi at the hotel, conference center or rented house fails. I'm currently on vacation with my family and some of our friends from Florida, and our rental home has a faulty Wi-Fi router. Thankfully, I have a bag full of goodies for just this occasion. more>>

Doing Astronomy with Python

One of the things that makes Python so powerful is that you can find a module for almost anything. In this article, I cover Astropy, which was originally developed by the Space Telescope Science Institute for doing astronomy calculations like image processing and observatory calculations. more>>

Build a “Virtual SuperComputer” with Process Virtualization

Build and release is a complicated process. I really don’t need to tell anyone that…but I did anyway. more>>

Firefox Security Exploit Targets Linux Users and Web Developers

Through the years, Firefox has enjoyed a reputation as one of the most secure Web browsers on any platform, and it's the default browser for many Linux distros. However, a security exploit appeared this week that has shown users they can't afford to be complacent about security. more>>

diff -u: What's New in Kernel Development

Linus Torvalds reported on some GCC compiler warnings that he felt were unnecessary, and he gave his opinion on how they should work instead. Specifically, GCC 5.1 would issue a warning against using a switch statement with a boolean variable, presumably because a boolean would be better handled by a simple if statement. more>>

Bounce Around IRC with ZNC

In my discussion on IRC with "bkidwell" (see the Non-Linux FOSS article for more on our talk), we were discussing how we connect to IRC. My main method is to SSH in to my co-located Raspberry Pi in Austria and connect to a screen session I have running that is constantly connected to IRC with Irssi. This works really well for me, and I never miss messages when I'm away. more>>

Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them

Ubuntu has received a lot of flack from the community for some of its commercial projects. Placing Amazon ads in Unity's Dash is a classic example of a poorly planned move that flies in the teeth of the community's ethos. A community built on the concepts of freedom and software that empowers the user (instead of some commercial concern) would never take that well. more>>

Calling All Linux Nerds!

The editorial staff here at Linux Journal wants to see your skills! Almost every time I'm in the #linuxjournal IRC channel, chit chatting on Google+, or tweeting back and forth on Twitter, I hear about really exciting projects our readers are involved with. more>>

Non-Linux FOSS: Flaky Connection? Mosh it!

Most of the work I do on computers is done via the command line. When I'm off on vacation somewhere, that means shoddy Wi-Fi and cell-phone tethering. Because cell-phone tethering gets expensive quick (I also have three teenage daughters with which I share a data plan), I try to use free Internet whenever I can. The biggest hassle with that method is dealing with broken SSH sessions. more>>

Alanna Brown heads up DevOps for PuppetLabs

Upcoming Webinar: Getting Started with DevOps

DevOps represents a profound change from the way most IT departments have traditionally worked: from siloed teams and high-anxiety releases to everyone collaborating on uneventful and more frequent releases of higher-quality code. more>>
LibreOffice 5.0 Looking Good and Shipping This Week

LibreOffice 5.0 Looking Good and Shipping This Week

LibreOffice 5.0 ships this week, and it brings a host of improvements that users will be excited about. more>>

Three More Lessons

[In June 2015, I gave a commencement address to the graduating class of High Mowing School in New Hampshire. I wrote many drafts for the talk, all toward extemporizing the final thing. My experience with Linux and open-source hackers had an influence on it and gets credit as well. That's why I'm sharing it here.—Doc] more>>

August 2015 Issue of Linux Journal: Programming

Welcome to Issue 10000000!

Binary jokes are always fun, and although technically I could say "welcome to issue <BINARY_NUMBER>" every month, it's more fun with nice round numbers li more>>

Syndicate content