Features

Keeping Secrets

Encryption with VeraCrypt

Jan 04, 2024

Protect your data and operating system from prying eyes with VeraCrypt.

Video Converter

Transcode your video library with ease

Sep 27, 2024

You can set up an automatic transcoding tool with CasaOS, HandBrake, FileBrowser, and HAProxy, to transcode your video library with ease. We show you how to get started.

No Hands!

Automatic installation with Ubuntu 22.04 and cloud-init

Sep 27, 2024

The new automatic installation method rolled out with Ubuntu 22.04 borrows some tools from the cloud configuration toolbox. We'll show you how to get started.

Web Heist

Hijacking browsers with BeEF

Sep 27, 2024

Bits of JavaScript from a malicious website can put your browser in a trance. A tool called BeEF encapsulates that power in a most diabolical way, providing yet another reason to avoid unknown links and keep your browser up to date.

Rolling Versus Point Releases

Meet in the Middle

Nov 06, 2024

Which is better: distributions that develop using point releases or those that use rolling releases?

Linguist: A Statistical Extension for LibreOffice Writer

Text File Statistics

Oct 08, 2024

Linguist offers writers interesting, valuable data to help them make the best of their words.

A Post-Open World

What’s Next After FOSS?

Sep 03, 2024

Have FOSS licenses outlived their usefulness? Bruce looks at what might come next in the world of free and open source software.

All-in-One Package Manager

bauh

Jul 31, 2024

The bauh package manager provides a single interface to manage all of your Linux software. Despite a few issues, bauh goes a long way in simplifying package management.

Improving the User Experience

The New KDE HIG

Jul 08, 2024

The KDE Human Interface Guidelines aim to help developers improve the user experience across a variety of aspects, and revisions are underway.

Stolen Credentials

Understanding and preventing credential stuffing attacks

Feb 24, 2024

A credential stuffing cyberattack uses username and password credentials stolen in a data breach to gain access to your accounts. We explain how it works and how to prevent yourself from becoming a victim.

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News