Tor and Privoxy Anonymous surfing with Tor and PrivoxyMay 31, 2006
Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.more »
Root Password Window Customizing the password popup windowApr 30, 2006
We’ll show you some tricks for configuring the root password popup window on Red Hat-based systems.more »
AppArmor Hardening systems with AppArmorApr 30, 2006
After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.more »
Realtime Multimedia applications and the realtime priorityMar 31, 2006
Linux provides tools and patches for speeding up the priority of multimedia applications. So if you're not getting the performance you expect, try shifting into overdrive.more »
Deleting Data Safely deleting dataFeb 28, 2006
Backups are a common topic, but you’ll hardly hear anyone mention safe data deletion.more »
Viruses in Linux The ways of viruses in LinuxDec 31, 2005
Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?more »
Hardware Detection Bash-based hardware detection for PCI and USBOct 31, 2005
If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.more »
New release targets Linux professionals.
The Fedora project adds Wayland and Gnome 3.22
CeBIT 2017: Open Source Forum Call for Papers
Long-time Linux antagonist joins the revolution.
Major bug affects Debian/Ubuntu distributions.
Canonical releases the minimal edition for embedded devices, Internet of Things, and cloud deployments.
The new release features improvements across the board, from performance to security.
Two out of three of the new members are women.
More than 5,000 people attended the event.
Linux Magazine will include the best of both magazines.