Linux Magazine is an English-language magazine serving IT professionals worldwide.
In the United States and Canada, Linux Magazine is known as Linux Pro Magazine.
Linux Magazine brings practical, hands-on solutions for real users who depend on Linux in their daily lives. Our readers are a new generation of Linux experts who are pushing the limits of Linux as a server, desktop, and development platform. They read Linux Magazine to learn more about technologies and products for Linux.
Advanced Yet Practical
Recent issues have focused on themes such as:
- System Administration
- Intrusion Detection
- Windows Compatibility
- Network Monitoring
- IP Telephony
- Linux Kernel
- Web Administration
Our unique combination of advanced coverage with a practical emphasis makes Linux Magazine a great fit for the kinds of reader who tend to make decisions and pass on recommendations.
"Love your magazine. Worth every penny... Thanks!" -- from linuxtidbits via Twitter
"Linux Pro Magazine has been my first and best resource for up-to-date information and a continual educational resource. I am a 11-year Linux 'veteran' and have read many magazines, but Linux Pro Magazine is able to transcend across all knowledge boundaries to provide the kind of information that all Linux users find useful, might I even say required in this overly competitive IT world. Thank you to Linux Pro Magazine and all of the staff for putting out such a great resource." -- from Patrick Swartz via email
To receive a Media Kit or to find out more about Linux Magazine/Linux Pro Magazine and sister publications worldwide, contact us today:
North America, UK, Ireland
Ann Jesse, firstname.lastname@example.org
phone +1 785 841 8834
Eric Henry, email@example.com
phone +1 785 917 0990
All other countries
Petra Jaser, firstname.lastname@example.org
phone +49 89 9934 1124
Michael Seiter, email@example.com
phone +49 89 9934 1123
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm