Tor and Privoxy Anonymous surfing with Tor and Privoxy

May 31, 2006

Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.

more »

Root Password Window Customizing the password popup window

Apr 30, 2006

We’ll show you some tricks for configuring the root password popup window on Red Hat-based systems.

more »

AppArmor Hardening systems with AppArmor

Apr 30, 2006

After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.

more »

Realtime Multimedia applications and the realtime priority

Mar 31, 2006

Linux provides tools and patches for speeding up the priority of multimedia applications. So if you're not getting the performance you expect, try shifting into overdrive.

more »

Deleting Data Safely deleting data

Feb 28, 2006

Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.

more »

Viruses in Linux The ways of viruses in Linux

Dec 31, 2005

Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?

more »

Books

Nov 30, 2005
Forensic Discovery Linux Made Easy...
more »

Hardware Detection Bash-based hardware detection for PCI and USB

Oct 31, 2005

If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News