Features

Stolen Credentials

Understanding and preventing credential stuffing attacks

Feb 24, 2024

A credential stuffing cyberattack uses username and password credentials stolen in a data breach to gain access to your accounts. We explain how it works and how to prevent yourself from becoming a victim.

Deepfake Sleuth

Detecting and disrupting AI

Jun 13, 2024

The rise of AI-generated deepfakes requires tools for detecting and even disrupting the technology.

Expanding options for better keyboards

The New Generation of Ergonomic Keyboards

May 21, 2024

Recent years have seen increasing innovation in ergonomic keyboards, and today’s leading producers offer solid options.

Not Your Dad's Database

An introduction to PostgreSQL

May 07, 2024

PostgreSQL, an open source object-relational database management system known for its reliability and extensibility, offers a robust feature set. If you are new to PostgreSQL, we help you get started with some of its most useful features.

Mini Miner

Mining the Monero cryptocurrency the CLI way

Jan 04, 2024

The Monero cryptocurrency lets you get in the game without spending thousands on hardware. We'll show you how.

Hunting and Gathering

Researching a target with passive reconnaissance tools

Jan 04, 2024

Cyberattacks often start with preliminary research on network assets and the people who use them. We'll show you some of the tools attackers use to get information.

Keys, shells, and layouts – find the right keyboard for your needs

What to Look for in an Ergonomic Keyboard

Apr 11, 2024

Today there are increasing options for keyboards better suited to long days spent at a desk, including options for customization.

Choices

Choosing an open source database management system

Apr 03, 2024

Open source database management systems offer greater flexibility and lower costs while avoiding vendor lock-in. Finding the right one depends on your project's needs.

Domains Gone Astray

Preventing DNS subdomain hijacking

Jan 04, 2024

Attackers can use poorly maintained DNS records to gain access to your IP address. The open source DNS Reaper lets you monitor your records to ward off attacks.

Get Organized

Scheduling tools for Linux

Jan 04, 2024

If you need help staying organized, Linux does not let you down with its large collection of organization and scheduling tools.

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News