Techniques for working with devices in Linux
Linux is getting much better at managing devices, and the versatility of open source software leads to some interesting innovations.
Experts and beginners will tell you that devices are the perennial challenge of Linux systems. Linux is fast, stable, and safe – if you can get it to run on your hardware. We all have our war stories, but most users will affirm that the penguin's affinity for PC hardware is improving. Many of the device problems that plagued Linux systems in the early days were solved years ago. A Linux user from 1999 would be totally amazed to install a Linux system today and watch the system auto-locate the hardware. But maybe not all the hardware. Linux still has trouble with certain devices, and the lag time between the appearance of a new driver and its integration can mean a built-in driver isn't available for months.
This month's Device Tricks cover story starts with a study of some recent developments in driver management tools for Linux. Jon Masters describes some of the obstacles facing Linux developers and looks at some recent solutions that promise more seamless device support.
The next article in this month's set looks at a library of tools for supporting MTP-based devices such as music players and webcams in Linux. We'll describe some open source applications that support MTP, and you'll learn how to communicate with MTP devices from the command line. Next we examine the aufs2 stacked filesystem, which lets you add temporary write capability to a filesystem on a read-only device. The last article in the set shows how you can protect your privacy by encrypting the data on your USB sticks.
If you're looking for an edge in the device game, you'll find plenty to think about up ahead. Read on for this month's Device Tricks cover story.
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm