Through the years, I have settled on maintaining my sensitive data in plain-text files that I then encrypt asymmetrically. Although I take care to harden my system and encrypt partitions with LUKS...
In my last article, I started a series on some of the challenges related to spawning secure servers on Amazon EC2. In that column, I discussed some of the overall challenges EC2 presents for...
Containers can be considered the third wave in service provision after physical boxes (the first wave) and virtual machines (the second wave). Instead of working with complete servers (hardware or...

Privacy Is Personal

Try to nail two boards together with your bare hands.

Can't be done. You need a hammer. But the power is not the hammer's. It's yours, because the hammer is your tool. As a tool, it becomes part of you. That's what tools do: they enlarge your capacity for action and effect.

That capacity is called agency. To have agency is to operate with effect in the world. more>>

July 2015 Issue of Linux Journal: Mobile

Infinite Portal to the Universe, 12-Hour Battery Life

A few months back, I accidentally left my phone on the nightstand, and spent an entire day without my cell phone. more>>

PHP for Non-Developers

After years of making it clear that I'm not a developer in just about every article I've written here at Linux Journal, I do have a confession to make. I can write the "Hello World" equivalent in almost every programming language out there. In assembly, it might have been "1+1", but my lack of advanced skills should be evident. more>>

FOSS A Code Boot Camp for Underprivileged Kids

A Code Boot Camp for Underprivileged Kids

A science center in Johannesburg, South Africa, has opened the doors to a five-month course in Linux-based Web apps and entrepreneurial skills. The training is available free of charge to underprivileged students from nearby townships; if it's successful, it will be rolled out nationwide.

more>>

Jeff Williams of the National Weather Service speaking on Centrify Server Suite

Comprehensive Identity Management and Audit for Red Hat Enterprise Linux

Centrally managing Windows users, group policy and entitlements through Active Directory is a blessing for Windows IT, but leaves RHEL IT out in the cold. Native tools only go so far. more>>

Linux Kernel 4.1 Released

Version 4.1 of the Linux kernel was released this week, and it includes a number of new features in the following areas. more>>

Secure Server Deployments in Hostile Territory

Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, some of you found yourselves modifying your behavior. The same thing happened to me when I started deploying servers into a public cloud (EC2 in my case). more>>

Gee Guide Linux server clusters

Take Control of Growing Redis NoSQL Server Clusters

"When I started to develop Web applications in the mid- 1990s, I naïvely thought that more>>

Django Templates

In my last article (February 2015), I explained how to create a simple Django project ("atfproject") and inside that, create a simple application (atfapp). The application worked in that if you went to the URL http://localhost:8000/hello/Reuven, you got the text "hello, Reuven". more>>

Drones from Parrot featuring embedded Linux

Attack of the Drones

With the price and size of computer hardware steadily decreasing, it's becoming more viable to use embedded Linux systems to control small robots and drones. There are plenty of projects for Raspberry Pi, but not everyone wants to build a drone from scratch. That's why enthusiasts will be pleased to hear about the new drones from Parrot.

more>>

Physics Analysis Workstation

CERN is the European Laboratory for Particle Physics. It has been in the news quite a bit lately with the discovery of the Higgs Boson at the Large Hadron Collider. Something that many people may not know is that it also has a long tradition of developing software for scientific use. more>>

The AtoMiC Toolkit!

If you're a cord cutter (and a nerd), you most likely have a server or two dedicated to serving and possibly retrieving videos from the Internet. Programs like Kodi and Plex are awesome for media delivery; however, there's more to a complete system than just playing the videos. more>>

GeekGuide technical books

Practical Books for the Most Technical People on the Planet

Linux Journal editors are proud to introduce GeekGuides-- practical ebooks for the most technical people on the planet. more>>

diff -u: What's New in Kernel Development

When you run a program as setuid, it runs with all the permissions of that user. And if the program spawns new processes, they inherit the same permissions. Not so with filesystem capabilities. When you run a program with a set of capabilities, the processes it spawns do not have those capabilities by default; they must be given explicitly. more>>

LUCI4HPC

Today's computational needs in diverse fields cannot be met by a single computer. Such areas include weather forecasting, astronomy, aerodynamics simulations for cars, material sciences and computational drug design. This makes it necessary to combine multiple computers into one system, a so-called computer cluster, to obtain the required computational power. more>>

Syndicate content