Linux Magazine and Linux Pro Magazine are celebrating their 10-year anniversary with the November 2010 issue, which includes a free archive DVD!
To celebrate this 10th anniversary with all our readers, we will have a prize drawing on January 11, 2011: 10 lucky subscribers will win a free 1-year subscription, and one lucky subscriber will win a free 10-year subscription!
Click here to order the November 2010 10th anniversary edition or a subscription to Linux Magazine and Linux Pro Magazine
Subscribers are automatically entered in our January 11, 2011 prize drawing!
(The lucky subsribers are selected and were informed via mail!)
In the anniversary issue #120 of Linux Magazine and Linux Pro Magazine, we give you all the tricks, all the hacks, all the apps, and every article published in our 10-year history!
Read the past 10 years of Linux history as you browse through The Complete Linux Magazine and Linux Pro Magazine Archive DVD included in this anniversary issue.
Inside our 120th issue of Linux Magazine and Linux Pro Magazine you'll:
- meet Linus Torvalds' parents: his mother takes us on a tour of Helsinki, and his father talks about his son's early influences;
- check out the MeeGo mobile operating system as it prepares for take off;
- find out what Mark Shuttleworth says about the new gesture suite for touch devices;
- learn about multi-core processing from the command line;
- get your Linux questions answered by Knoppix creator Klaus Knopper;
- and look back on our first issue and our 10-year history with Rikki Kite.
We'll also show you how to:
- roll your own OpenOffice extensions,
- access your iTunes library online,
- optimize and troubleshoot TCP connections,
- speed up the shell with GNU parallel,
- and much more!
Don't miss out on this special 10-year anniversary issue #120!
Or look for Issue #120 on newsstands worldwide:
- UK: October 2nd
- North America: October 29th
- Australia: November 29th
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm