Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Command Line – Aria2 Aria2 – Making your downloads sing your tuneApr 30, 2013
Downloading files is central to modern computing. Whether you use your browser's function or rely on more specialized tools, you won't find a more versatile utility than Aria2.more »
Real-World Raspberry Pi Exploring the Raspberry Pi through real-world projectsApr 19, 2013
The single-circuit-board Raspberry Pi computer, only as big as a credit card, makes it easy to gain experience with embedded Linux systems. We'll show you some hands-on examples of how to use the Raspberry Pi in an everyday environment.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
Command Line – Probing /proc Understanding the transitory /proc filesystemMar 15, 2013
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.more »
Command Line – Bastille Linux Learning the basics of architectural securityFeb 22, 2013
Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural – that is, in its configuration.more »
Command Line – CUPS An introduction to printingJan 23, 2013
Using the Common Unix Printing System, you can configure and manage your printer from the command line.more »
Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm