Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Command Line – Aria2 Aria2 – Making your downloads sing your tuneApr 30, 2013
Downloading files is central to modern computing. Whether you use your browser's function or rely on more specialized tools, you won't find a more versatile utility than Aria2.more »
Real-World Raspberry Pi Exploring the Raspberry Pi through real-world projectsApr 19, 2013
The single-circuit-board Raspberry Pi computer, only as big as a credit card, makes it easy to gain experience with embedded Linux systems. We'll show you some hands-on examples of how to use the Raspberry Pi in an everyday environment.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
Command Line – Probing /proc Understanding the transitory /proc filesystemMar 15, 2013
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.more »
Command Line – Bastille Linux Learning the basics of architectural securityFeb 22, 2013
Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural – that is, in its configuration.more »
Command Line – CUPS An introduction to printingJan 23, 2013
Using the Common Unix Printing System, you can configure and manage your printer from the command line.more »
Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.