I don't know how many readers know this, but my very first Linux Journal column ("Browse the Web without a Trace", January 2008) was about how to set up and use Tor. Anonymity and privacy on the...
Tails logo
A few columns ago, I started a series aimed at helping everyone improve their privacy and security on the Internet. The first column in this series was an updated version of a Tor column I wrote a...
Cluetrain cover
I started writing for Linux Journal as a contributing editor in 1996 (here's one piece), and went full-time 1998, not long before I began co-writing The Cluetrain Manifesto with Chris Locke, David...

Android Candy: Repix, Not Just Another Photo App

Apps like Instagram have made photo filters commonplace. I actually don't mind the vintage look for quick cell-phone snapshots, but a filter can do only so much. At first glance, Repix is another one of those "make your photo cool" apps that does little more than add a border and change saturation levels. more>>

Wanted: Your Embedded Linux Projects

Our "Embedded Linux" issue of Linux Journal is just around the corner, and we want YOUR project to be in it! Whether you're embedding a Beagle Bone Black into a dish so you can automatically feed your black Beagle a bone, or you're developing an Arduino-based butler to answer your front door -- we want to hear about it! more>>

Linux Kernel Testing and Debugging

Linux Kernel Testing Philosophy

Testing is an integral and important part of any software development cycle, open or closed, and Linux kernel is no exception to that. more>>

Tails above the Rest, Part III

In my first two columns in this series, I gave an overview of Tails, including how to get the distribution securely, and once you have it, how to use some of the basic tools. more>>

Dolphins in the NSA Dragnet

There's an old quote from Jamie Zawinkski that goes: "Some people, when confronted with a problem, think ‘I know, I'll use regular expressions.’ Now they have two problems." Even people like me who like regular expressions laugh at the truth in that quote, because we've seen the consequences when someone doesn't think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people. more>>

Are you an extremist?

Since the news broke yesterday that we are an extremist publication according to the NSA, we at Linux Journal have thought a lot about what that might mean t more>>

Tails above the Rest, Part II

Now that you have Tails installed, let's start using it. more>>

A Pain in the Person

At what point will we say "enough"? more>>

July 2014 Issue of Linux Journal: Mobile

Is That a Penguin in Your Pocket?

We're getting to the point in technological evolution that "mobile technology" no longer will be a term. more>>

How YARN Changed Hadoop Job Scheduling

Scheduling means different things depending on the audience. To many in the business world, scheduling is synonymous with workflow management. Workflow management is the coordinated execution of a collection of scripts or programs for a business workflow with monitoring, logging and execution guarantees built in to a WYSIWYG editor. more>>

diff -u: What's New in Kernel Development

David Herrmann wanted to disable the virtual terminal subsystem in order to save space on a kernel that didn't need a VT. But, he still wanted to see kernel oops output for debugging purposes. The problem was that only the VT subsystem would display oops output—and he'd just disabled it. more>>

Android Candy: I'm Sorry 2048 Times

It seems like every day there's a new mobile game that takes the world by storm. Whether it's Flappy Bird or Candy Crush, there's something about simple games that appeals to our need for quick, instant gratification. more>>

Super Pi Brothers

I don't game as much as I used to. Although I've certainly spent countless hours of my life in front of a Nintendo, SNES, or after that, playing a first-person shooter on my computer (Linux only, thank you), these days, my free time tends to go toward one of the many nongaming hobbies I've accumulated. more>>

A Process for Managing and Customizing HPC Operating Systems

High-performance computing (HPC) for the past ten years has been dominated by thousands of Linux servers connected by a uniform networking infrastructure. The defining theme for an HPC cluster lies in the uniformity of the cluster. more>>

Non-Linux FOSS: My Portable Windows Lab

Portable apps aren't anything new. There are variations of "single executable apps" for most platforms, and some people swear by keeping their own applications with them for use when away from home. I don't usually do that, as most of what I do is on-line, but there is one exception: security. more>>

Syndicate content
Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix