Security is such an omnipresent theme that we try to follow it in all sections of the mag, rather than devoting a single section to it.
We sometimes base whole cover stories on security topics, and you'll find security-related articles in our Know-How, Sysadmin, Programming, and even Community sections. You are probably right that our LinuxUser section, which focuses on the experience of the desktop user, might have less of a security emphasis than some of the other sections; however, we are always looking for good desktop security articles.
Perhaps more to the point, even if you are a casual or beginning user, we encourage you to delve into our Know-How and Sysadmin sections. Our goal is for every article to be useful for every reader.
Even if you aren't cooking up enterprise firewall configurations or implementing your own intrusion detection system, the concepts discussed in these advanced articles will still provide some insights on how to build a safer network.
As your article on the Jokosher audio editor in the April 2009 issue states, Jokosher is a work in progress. However I think you did a really good job of covering the things it does well currently. There were few criticisms in the article. I guess this means we are doing pretty well. I'm sure there are many things that could be a lot better. You can always let us know.
The article states:
"It is impractical and downright annoying that you cannot select multiple track takes to move them at the same time."
I found there is already a bug for this one, but I will make sure it is top priority for the next release.
Thanks for the good review.
Laszlo Pandy (Jokosher maintainer)
We were happy to provide our readers with this introduction to Jokosher. Certainly the open source world has a need for a free audio editor that is easy enough for amateurs, and Jokosher has lots of potential.
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.