Linux Magazine is an English-language magazine serving IT professionals worldwide.
In the United States and Canada, Linux Magazine is known as Linux Pro Magazine.
Linux Magazine brings practical, hands-on solutions for real users who depend on Linux in their daily lives. Our readers are a new generation of Linux experts who are pushing the limits of Linux as a server, desktop, and development platform. They read Linux Magazine to learn more about technologies and products for Linux.
Advanced Yet Practical
Recent issues have focused on themes such as:
- System Administration
- Intrusion Detection
- Windows Compatibility
- Network Monitoring
- IP Telephony
- Linux Kernel
- Web Administration
Our unique combination of advanced coverage with a practical emphasis makes Linux Magazine a great fit for the kinds of reader who tend to make decisions and pass on recommendations.
"Love your magazine. Worth every penny... Thanks!" -- from linuxtidbits via Twitter
"Linux Pro Magazine has been my first and best resource for up-to-date information and a continual educational resource. I am a 11-year Linux 'veteran' and have read many magazines, but Linux Pro Magazine is able to transcend across all knowledge boundaries to provide the kind of information that all Linux users find useful, might I even say required in this overly competitive IT world. Thank you to Linux Pro Magazine and all of the staff for putting out such a great resource." -- from Patrick Swartz via email
To receive a Media Kit or to find out more about Linux Magazine/Linux Pro Magazine and sister publications worldwide, contact us today:
North America, UK, Ireland
Ann Jesse, email@example.com
phone +1 785 841 8834
Eric Henry, firstname.lastname@example.org
phone +1 785 917 0990
All other countries
Petra Jaser, email@example.com
phone +49 89 9934 1124
Michael Seiter, firstname.lastname@example.org
phone +49 89 9934 1123
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.