I have a love/hate relationship with the contact manager on my phone. I absolutely love having all of that information available, and I love even more that it syncs with my Google contacts. What I...
In my last article, I continued looking at the Django Web framework, showing how you can create and modify models. As you saw, Django expects you to describe your models using Python code. The model...
I was in the buzz-making business long before I learned how it was done. That happened here, at Linux Journal. Some of it I learned by watching kernel developers make Linux so useful that it became...

Android Candy: Copay—the Next-Generation Bitcoin Wallet

When I hear the word "copay", I think of the doctor's office. Thankfully, the Copay app from the folks at Bitpay doesn't cost you anything, and it keeps your Bitcoin healthy and secure. I've mentioned many Bitcoin wallet applications and cloud solutions during the past few years, but Copay truly is different. It has features other wallets can't touch, such as: more>>

The True Internet of Things

Before the Internet there were just nets, and they didn't get along. Each was a country or a city-state of its own, with hard boundaries that could not be crossed—or could be crossed only if the owners of the networks created closed and silo'd ways of doing it. more>>

September 2015 Issue of Linux Journal: HOW-TOs

How to Do That Thing You Do

I love to learn. I've always been a learner, so grade school and college were both extremely enjoyable for me. more>>

Using tshark to Watch and Inspect Network Traffic

Most of you probably have heard of Wireshark, a very popular and capable network protocol analyzer. What you may not know is that there exists a console version of Wireshark called tshark. The two main advantages of tshark are that it can be used in scripts and on a remote computer through an SSH connection. more>>

Where's That Pesky Hidden Word?

I've been promising my 11-year-old for a long time now that I'd write a program that would let you build custom word searches based on a list of words given by the user. I wrote one years and years ago in C, but since I can't find that code any more and wanted to tackle another interesting project for this column, that's what I'm going to look at herein. more>>

A Project to Guarantee Better Security for Open-Source Projects

With many open-source projects built on top of others, a security weakness in a common piece of infrastructure can have far-reaching consequences. As OpenSSL's Heartbleed security hole demonstrated, these vulnerabilities can appear in even the most trusted packages. more>>

Concerning Containers' Connections: on Docker Networking

Containers can be considered the third wave in service provision after physical boxes (the first wave) and virtual machines (the second wave). Instead of working with complete servers (hardware or virtual), you have virtual operating systems, which are far more lightweight. more>>

My Network Go-Bag

I often get teased for taking so much tech hardware with me on trips—right up until the Wi-Fi at the hotel, conference center or rented house fails. I'm currently on vacation with my family and some of our friends from Florida, and our rental home has a faulty Wi-Fi router. Thankfully, I have a bag full of goodies for just this occasion. more>>

Doing Astronomy with Python

One of the things that makes Python so powerful is that you can find a module for almost anything. In this article, I cover Astropy, which was originally developed by the Space Telescope Science Institute for doing astronomy calculations like image processing and observatory calculations. more>>

Build a “Virtual SuperComputer” with Process Virtualization

Build and release is a complicated process. I really don’t need to tell anyone that…but I did anyway. more>>

Firefox Security Exploit Targets Linux Users and Web Developers

Through the years, Firefox has enjoyed a reputation as one of the most secure Web browsers on any platform, and it's the default browser for many Linux distros. However, a security exploit appeared this week that has shown users they can't afford to be complacent about security. more>>

diff -u: What's New in Kernel Development

Linus Torvalds reported on some GCC compiler warnings that he felt were unnecessary, and he gave his opinion on how they should work instead. Specifically, GCC 5.1 would issue a warning against using a switch statement with a boolean variable, presumably because a boolean would be better handled by a simple if statement. more>>

Bounce Around IRC with ZNC

In my discussion on IRC with "bkidwell" (see the Non-Linux FOSS article for more on our talk), we were discussing how we connect to IRC. My main method is to SSH in to my co-located Raspberry Pi in Austria and connect to a screen session I have running that is constantly connected to IRC with Irssi. This works really well for me, and I never miss messages when I'm away. more>>

Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them

Ubuntu has received a lot of flack from the community for some of its commercial projects. Placing Amazon ads in Unity's Dash is a classic example of a poorly planned move that flies in the teeth of the community's ethos. A community built on the concepts of freedom and software that empowers the user (instead of some commercial concern) would never take that well. more>>

Calling All Linux Nerds!

The editorial staff here at Linux Journal wants to see your skills! Almost every time I'm in the #linuxjournal IRC channel, chit chatting on Google+, or tweeting back and forth on Twitter, I hear about really exciting projects our readers are involved with. more>>

Syndicate content