Features

Keys, shells, and layouts – find the right keyboard for your needs

What to Look for in an Ergonomic Keyboard

Apr 11, 2024

Today there are increasing options for keyboards better suited to long days spent at a desk, including options for customization.

Hunting and Gathering

Researching a target with passive reconnaissance tools

Jan 04, 2024

Cyberattacks often start with preliminary research on network assets and the people who use them. We'll show you some of the tools attackers use to get information.

Keeping Secrets

Encryption with VeraCrypt

Jan 04, 2024

Protect your data and operating system from prying eyes with VeraCrypt.

Mini Miner

Mining the Monero cryptocurrency the CLI way

Jan 04, 2024

The Monero cryptocurrency lets you get in the game without spending thousands on hardware. We'll show you how.

Peek Inside

Quick malware analysis with Linux tools

Jan 30, 2024

Forensic experts can't just delete a sketchy file – sometimes the challenge is to see what is in it without triggering an attack. Learn about some of the tools investigators use for analyzing suspicious files.

Expanding options for better keyboards

The New Generation of Ergonomic Keyboards

May 21, 2024

Recent years have seen increasing innovation in ergonomic keyboards, and today’s leading producers offer solid options.

Good Question!

Use AI to generate shell input

Jan 30, 2024

Shell Genie uses artificial intelligence to convert your questions into commands in the terminal.

Masquerade

Learn about phishing attacks with HiddenEye

Jan 30, 2024

To stop an attacker, you need to think like an attacker, and to think like an attacker, you need to learn the tools for the trade. HiddenEye helps you simulate a phishing attack.

Nicely Packaged

A C/C++ package manager

Jan 30, 2024

If you use a state-of-the-art language such as C/C++, you need a package manager in your toolbox for managing libraries and their dependencies. Microsoft's vcpkg package manager offers an easy-to-use, platform-independent solution.

Seamless Overview

Jail and monitor your applications

Feb 24, 2024

Software from unknown sources always poses some risks. With the strace analysis tool and the Firejail sandbox, you can monitor and isolate unknown applications to safeguard your system.

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News