The Latest

http://www.linuxjournal.com/

On Data Tagging

Pick up most items, from the soup can, to the library book, and you will find a data tag. In most cases, that tag is the simple, ubiquitous bar code that seems to have been around forever. more>>

See video

Quick SOCKS Proxy with an SSH Tunnel

Shawn demonstrates how to tunnel web traffic through a SOCKSproxy using SSH.

Android Candy: WiFi Analyzer

I have a new day job, and as part of the hiring package, I was issued a smartphone. I'm a little bitter that it doesn't include a tethering plan, but that doesn't upset me nearly as much as the lack of Wi-Fi analysis apps. See, my new job issued me an iPhone. I really like the iPhone (it's true, I can't lie), but in order to scan Wi-Fi, I'd have to jailbreak my phone! more>>

Kyle Rankin to Keynote SCALE 11x

The Southern California Linux Expo SCALE 11X has just announced that popular Linux Journal columnist, Kyle Rankin, will give the second keynote at the expo in February.

more>>

Your First Bite of Raspberry Pi

I have to give Kyle Rankin all the credit for my Raspberry Pi collection. I never really felt geeky enough to do anything with an Arduino, and for some reason I mentally lumped the RPi into the same world. Boy was I short-sighted! Thankfully Kyle showed me the light, and I managed to snag some of the new 512MB model B units. more>>

Help Us Feed You Pi!

Everybody loves the Raspberry Pi, and there are so many things it can do, filling an issue with Raspberry Pi goodness should be a piece of cake! To do that, however, we need your help. more>>

Extending GlusterFS with Python

Are you a Python programmer who wishes your storage could do more for you? Here's an easy way to add functionality to a real distributed filesystem, in your favorite language. more>>

Python Scripts as a Replacement for Bash Utility Scripts

For Linux users, the command line is a celebrated part of our entire experience. Unlike other popular operating systems, where the command line is a scary proposition for all but the most experienced veterans, in the Linux community, command-line use is encouraged. more>>

Gaming Like It's 1993

Two things happened in 1993: I attended my first year of college, and I played a lot of Scorched Earth. more>>

Getting Started with Salt Stack-the Other Configuration Management System Built with Python

I was proudly wearing one of my Salt Stack shirts the other day when my daughter asked me, "What is Salt Stack?" I began by explaining the problem it solved. If you have multiple servers and want to do things to those servers, you would need to log in to each one and do those things one at a time on each one. They could be fairly simple tasks like restarting them or checking how long they have been running. Or, you might want to do more complicated things like installing software and then configuring that software based upon your own specific criteria. You also might want to add users and configure permissions for them. more>>

Biggest Data

Turns out maps matter.

That's always been the case for me. I'm a map freak. I own hundreds of paper maps in various specialties, plus many atlases, books on geography, geology and other geo-obsessions. But I'm no longer an edge case, because maps are proving to be essential on smartphones, which today approaches a billion or more people. Digital maps on phones are now among the core portfolio of smartphone apps, alongside voice, text, calendar and contacts. What could be more mobile about a phone than a map to help the user look things up and get around? more>>

Rsync, It's GRRRRaphical!

Every year for our Readers' Choice survey, the venerable tool rsync gets votes for favorite backup tool. That never surprises us, because every time I need to copy a group of files and folders, rsync is the tool I use by default. more>>

January 2013 Issue of Linux Journal: Security

Sticky Note of Doom

Years ago, I had the brilliant idea that all my users in the finance department should have complex passwords. This made perfect sense to everyone, since dealing with millions of dollars of revenue is something that should be secured. So, the passwords were changed with complexity requirements enforced. I slept better that night knowing our paychecks were no longer secured by passwords like "mustang" or "mrwhiskers".

more>>

Kbuild: the Linux Kernel Build System

One amazing thing about Linux is that the same code base is used for a different range of computing systems, from supercomputers to very tiny embedded devices. If you stop for a second and think about it, Linux is probably the only OS that has a unified code base. more>>

Space Is Big-See It All!

I have a huge collection of NASA photos taken from the Astronomy Pic of the Day Web site (http://apod.nasa.gov/apod/astropix.html) stored in a folder in my Dropbox. No matter what computer system I'm using, I rotate those images on my background, getting a virtual tour of the universe on every screen. more>>

The Path to Commerce Kickstart 2.0

Editor's note: Drupal Commerce Kickstart 2.0 was released yesterday after much testing and perfecting, and the artic more>>

Symbolic Math with Python

Many programming languages include libraries to do more complicated math. You can do statistics, numerical analysis or handle big numbers. One topic many programming languages have difficulty with is symbolic math. If you use Python though, you have access to sympy, the symbolic math library. more>>

Raising the Bar for Linux Trainers

You can write shell scripts in mere seconds, hack the kernel in your sleep and perform other feats of Linux wizardry—but can you teach? more>>

Readers' Choice Awards

Readers' Choice votes are in! Compare your favorites with other readers and see if you're the oddball or everyone else is! more>>

Playing Value Subtraction Games

I'm writing this in an Amsterdam apartment we rented for the weekend through AirBNB. The main reason we chose this place wasn't comfort or convenience. It was connectivity. This apartment was relatively cheap (about a quarter or a third of the price of a three-star hotel), but reports said the Internet connection was good. more>>

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix