Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Command Line – Aria2 Aria2 – Making your downloads sing your tuneApr 30, 2013
Downloading files is central to modern computing. Whether you use your browser's function or rely on more specialized tools, you won't find a more versatile utility than Aria2.more »
Real-World Raspberry Pi Exploring the Raspberry Pi through real-world projectsApr 19, 2013
The single-circuit-board Raspberry Pi computer, only as big as a credit card, makes it easy to gain experience with embedded Linux systems. We'll show you some hands-on examples of how to use the Raspberry Pi in an everyday environment.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
Command Line – Probing /proc Understanding the transitory /proc filesystemMar 15, 2013
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.more »
Command Line – Bastille Linux Learning the basics of architectural securityFeb 22, 2013
Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural – that is, in its configuration.more »
Command Line – CUPS An introduction to printingJan 23, 2013
Using the Common Unix Printing System, you can configure and manage your printer from the command line.more »
Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.