Security is such an omnipresent theme that we try to follow it in all sections of the mag, rather than devoting a single section to it.
We sometimes base whole cover stories on security topics, and you'll find security-related articles in our Know-How, Sysadmin, Programming, and even Community sections. You are probably right that our LinuxUser section, which focuses on the experience of the desktop user, might have less of a security emphasis than some of the other sections; however, we are always looking for good desktop security articles.
Perhaps more to the point, even if you are a casual or beginning user, we encourage you to delve into our Know-How and Sysadmin sections. Our goal is for every article to be useful for every reader.
Even if you aren't cooking up enterprise firewall configurations or implementing your own intrusion detection system, the concepts discussed in these advanced articles will still provide some insights on how to build a safer network.
As your article on the Jokosher audio editor in the April 2009 issue states, Jokosher is a work in progress. However I think you did a really good job of covering the things it does well currently. There were few criticisms in the article. I guess this means we are doing pretty well. I'm sure there are many things that could be a lot better. You can always let us know.
The article states:
"It is impractical and downright annoying that you cannot select multiple track takes to move them at the same time."
I found there is already a bug for this one, but I will make sure it is top priority for the next release.
Thanks for the good review.
Laszlo Pandy (Jokosher maintainer)
We were happy to provide our readers with this introduction to Jokosher. Certainly the open source world has a need for a free audio editor that is easy enough for amateurs, and Jokosher has lots of potential.
Buy this article as PDF
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.