Seamless Integration Intro Expert techniques for living with WindowsNov 30, 2008
Yes, you can do that with Linux… Even if you want to live in an open source world, it's still full of Windows. This month we study strategies for Windows integration.more »
Open source developer Tobias Oetiker, in his presentation at the USENIX LISA conference in San Diego, described how he could help one thousand Windows users at Swisscom.com speed up their computers.more »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine. commore »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you hav a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
LogFS Flash memory and the LogFS filesystemNov 05, 2008
Flash is now an everyday part of the Linux environment. The new LogFS filesystem will help you contend with the problems of flash memory.more »
Charly's Column The sys admin's daily grind: KnockdAug 31, 2008
Horror stories are full of scary characters knocking on doors at night. On Linux, we just call this port knocking, and it can actually be quite useful.more »
Panda3D 3D worlds with Python and Panda3DJul 15, 2008
Several free game engines are available for Linux users, but programming with them is often less than intuitive. Panda3D is an easy-to-use engine that is accessible enough for newcomers but still powerful enough for the pros at Disney Studios.more »
Charly's Column Configuring event-triggered commands with IncronJul 10, 2008
While cron doggedly keeps to a fixed schedule, Incron monitors directories and runs commands when changes occur.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm