The Latest

DevOps: Better Than the Sum of Its Parts

Most of us longtime system administrators get a little nervous when people start talking about DevOps. It's an IT topic surrounded by a lot of mystery and confusion, much like the term "Cloud Computing" was a few years back. Thankfully, DevOps isn't something sysadmins need to fear. more>>

Play for Me, Jarvis

Elon Musk is known to be particularly apprehensive about artificial intelligence. Although many of us are both excited and worried about the potential future of AI, most don't need to fear computers taking over in the creative realms of society.

Or do we? more>>

Drupageddon: SQL Injection, Database Abstraction and Hundreds of Thousands of Web Sites

Drupal is a very widely used open-source content management system. It initially was released in 2001, and recent statistics show Drupal as the third-most popular content management system, with just less than 800,000 Web sites utilizing Drupal as a content management system. more>>

Non-Linux FOSS: .NET?

No, really! While on a normal day, the word "Microsoft" can be used as an antonym for "Open", the world of .NET seems to be going legitimately open source. more>>

JavaScript All the Way Down

There is a well known story about a scientist who gave a talk about the Earth and its place in the solar system. more>>

Designing Foils with XFLR5

For any object moving through a fluid, forces are applied to the object as the fluid moves around it. A fluid can be something like water, or even something like the air around us. When the object is specifically designed to maximize the forces that the fluid can apply, you can designate these designs as airfoils. A more common name that most people would use is a wing. more>>

diff -u: What's New in Kernel Development

Recently there was some discussion about ways to ease the tired backs of kernel maintainers. Apparently the merge windows are times of great labor, and some folks wanted to alert contributors to some preferable code submission habits. more>>

Here, Have Some Money...

I love Bitcoin. It's not a secret; I've written about Bitcoin mining and cryptocurrency in the past. I'm the first to admit, however, that we're at the very beginning of the cryptocurrency age. more>>

Consent That Goes Both Ways

Whatever your opinions about Do Not Track, set them aside for a minute and just look at what the words say and who says them. Individuals—the people we call "users" (you know, like with drugs)—are the ones saying it. In grammatical terms, "do not track" is spoken in the first person. more>>

Beyond Cron GeekGuide Skybot Linux

New GeekGuide: Beyond Cron

How to Know When You've Outgrown Cron Scheduling--and What to Do Next

If you've spent any time around UNIX, you've no doubt learned to use and appreciate cron, the ubiquitous job scheduler that comes with almost every version of UNIX that exists. Cron is simple and easy to use, and most important, it just works. more>>

April 2015 Issue of Linux Journal: High-Performance Computing

High Performance: a Relative Term

My Pebble watch has several orders of magnitude more power than the mainframe computers used by NASA to land astronauts on the moon an more>>

Not So Dynamic Updates

Typically when a network is under my control, I like my servers to have static IPs. Whether the IPs are truly static (hard-coded into network configuration files on the host) or whether I configure a DHCP server to make static assignments, it's far more convenient when you know a server always will have the same IP. more>>

Users, Permissions and Multitenant Sites

In my last article, I started to look at multitenant Web applications. These are applications that run a single time, but that can be retrieved via a variety of hostnames. more>>

New Products

Please send information about releases of Linux-related products to or New Products c/o Linux Journal, PO Box 980985, Houston, TX 77098. Submissions are edited for length and content.

Flexible Access Control with Squid Proxy

Large enterprises and nuclear laboratories aren't the only organizations that need an Internet access policy and a means of enforcing it. My household has an Internet access policy, and the technique I've used to enforce it is applicable to almost any organization. In our case, I'm not too concerned about outside security threats. more>>

Solving ODEs on Linux

Many problems in science and engineering are modeled through ordinary differential equations (ODEs). An ODE is an equation that contains a function of one independent variable and its derivatives. more>>

Devops Linux Journal

DevOps: Everything You Need to Know

Have projects in development that need help? Have a great development operation in place that can ALWAYS be better? more>>

Tighten Up SSH

SSH is a Swiss Army knife and Hogwart's magic wand all rolled into one simple command-line tool. As often as we use it, we sometimes forget that even our encrypted friend can be secured more than it is by default. For a full list of options to turn on and off, simply type man sshd_config to read the man page for the configuration file. more>>

Security in Three Ds: Detect, Decide and Deny

Whenever a server is accessible via the Internet, it's a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you'll surely find lots of "authentication failure" lines, originating from IPs that have nothing to do with you or your business. more>>