Features

Social and Private with Friendica

Developing for a Post-Facebook World

Jun 19, 2012

Be social and keep in touch while maintaining your privacy with Friendica, a network that centralizes social media.

Cinnamon 1.4

Mint’s Cinnamon Desktop

May 31, 2012

Because of their novel look and feel, both Gnome 3 and Ubuntu’s Unity have been running into harsh criticism from many users. In response, Mint, an Ubuntu spinoff, has revived the Gnome 2 feel on its own desktop.

Controlled Delay Management

A new aggregate queue length algorithm for network bottlenecks.

May 31, 2012

The persistent and growing problem of bufferbloat is getting serious relief thanks to a new active queue management tool known as a Controlled Delay – a tool that, thanks to heroic efforts, is now ready for Linux.

Unified Event Monitoring with Splunk

May 22, 2012

Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.

Intrusion Detection with fail2ban

May 22, 2012

For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.

Getting Started with Analytics

Data Analytics for the Newbie

May 03, 2012

The huge emphasis on data and data analytics in the business world and the IT job market might have you thinking about brushing up on your database skills. And what better platform than Linux to obtain powerful and free tools to flex and train your data muscles?

Tethering

Using the mobile Internet

May 03, 2012

Thanks to the modems built into today’s smartphones and tablets, you can use fast mobile Internet from almost anywhere. The mobile devices can also get your laptop online.

Calligra: The Other Office Suite Narrows the Gap

Apr 23, 2012

On April 11, Calligra Suite announced its first release, version 2.4. This release takes Calligra several steps closer to being an alternative to LibreOffice, especially in its graphical applications.

Bash Tips: Debugging and Configuration

Apr 19, 2012

Even tried and trusted configurations that have proved their value through the years can be tripped up by special cases – for example, all of your users logging in with the same IP address. Experienced administrators and Bash aficionados will then enable debugging and launch a systematic search for configuration errors.

Protect your Documents with GPG

GPG

Apr 09, 2012

You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.

Issue 163/2014

Buy this issue as a PDF

Digital Issue: Price $9.99
(incl. VAT)

News