Features

Fine-tuned

Optimize flash memory in Linux

May 09, 2016

Solid state drives make everything run faster and more smoothly, but you can squeeze out even more performance with some practical optimization steps.

Signs of Life at the Office

Test LibreOffice automatically

May 09, 2016

Companies that depend on LibreOffice have a reason to wonder whether the office suite is working on all systems. You can use Python and the LibreOffice API to check.

Reloaded

Automatically restore firewall filter rules

Jun 03, 2016

The Linux iptables packet filter lacks an easy way to load rules automatically after restarting a system, but you can automate this process several ways.

Hidden

Encryption with VeraCrypt

Jun 03, 2016

The VeraCrypt encryption software comes with a handy graphical interface, and the ability to hide a container in an encrypted volume adds a unique professional feature: plausibly deniable encryption.

Oh, Snap!

Restore Btrfs files at the push of a button with Snapper

Jul 01, 2016

Thanks to Btrfs snapshots, Snapper lets you restore a system to a previous state in case of failure.

Embedded

Storing metadata in files

Aug 04, 2016

With the Python XMP Toolkit, programmers can develop applications that store metadata in files.

Magic Act

Access your servers securely with a Magic URL

Aug 04, 2016

With a highly secure Linux server, you don't need a fixed IP address to connect over a cellphone network from anywhere on the planet if you have a Magic URL.

Steady Hand

Keep watch over your server system with Webmin

Aug 04, 2016

Every leading Linux distribution offers some kind of built-in GUI management tool, but the world still has room for a flexible, distribution-independent tool like Webmin.

Unleashed

Use your Chromebook with Linux

Aug 19, 2016

Chromebooks are firmly locked in the Google jail, but with the right know-how, you can break out of vendor lock-in and operate the devices with free software.

Key Service

Neatly managing and handling PGP/GnuPG keyrings

Sep 30, 2016

PGP/GnuPG is becoming increasingly popular, thanks to digital crime and government surveillance. We take a look behind the scenes and show how you can keep your keyring current and valid.

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News