A few columns ago, I started a series aimed at helping everyone improve
their privacy and security on the Internet. The first column in this
series was an updated version of a Tor column I wrote a few years
I don't know how many readers know this, but my very first Linux
column ("Browse the Web without a Trace", January 2008) was about how
to set up and use Tor. Anonymity and privacy on the Internet certainly
take on a different meaning in the modern era of privacy-invading
software and general Internet surveillance. more>>
Scheduling means different things depending on the audience. To many
in the business world, scheduling is synonymous with workflow management.
Workflow management is the coordinated execution of a collection of
scripts or programs for a business workflow with monitoring, logging and
execution guarantees built in to a WYSIWYG editor. more>>
David Herrmann wanted to disable the
virtual terminal subsystem in order to
save space on a kernel that didn't need a VT. But, he still wanted to see
kernel oops output for debugging purposes. The problem was that only the VT
subsystem would display oops output—and he'd just disabled it.
It seems like every day there's a new mobile game that takes the world by
storm. Whether it's Flappy Bird or Candy
Crush, there's something about
simple games that appeals to our need for quick, instant gratification.
I don't game as much as I used to. Although I've certainly spent
countless hours of my life in front of a Nintendo, SNES, or after that, playing a
first-person shooter on my computer (Linux only, thank you), these days,
my free time tends to go toward one of the many nongaming hobbies I've
High-performance computing (HPC) for the past ten years has been
dominated by thousands of Linux servers connected by a uniform
networking infrastructure. The defining theme for an HPC cluster lies
in the uniformity of the cluster. more>>
Portable apps aren't anything new. There are variations of "single
executable apps" for most platforms, and some people swear by keeping
their own applications with them for use when away from home. I don't
usually do that, as most of what I do is on-line, but there is one
In my last few articles, I looked at several different Python modules
that are useful for doing computations. But, what tools are available to
help you analyze the results from those computations? Although you could
do some statistical analysis, sometimes the best tool is a graphical
representation of the results. more>>
When I wrote about Usenet and Sickbeard a while back, I got many e-mails
that I had broken the first rule of Usenet: don't talk about Usenet. I'm a
sucker for freedom though, and I can't help but share when cool programs
are available. This month, I switched from Sickbeard to NZBDrone for
managing my television shows.
Linux-based container infrastructure is an emerging cloud technology
based on fast and lightweight process virtualization. It provides
its users an environment as close as possible to a standard Linux
Occasionally as seasoned Linux users, we run across simple things we
never knew existed—and are amazed. Whether it's tab autocompletion,
sudo !! for when you forgot to type sudo or even recursive file listing
with ls, the smallest tricks can be so incredibly useful. Not long ago,
I had one of those moments.
Please send information about releases of Linux-related products
to firstname.lastname@example.org or New
Products c/o Linux Journal, PO Box 980985, Houston,
TX 77098. Submissions are edited for length and content.
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.