Security is such an omnipresent theme that we try to follow it in all sections of the mag, rather than devoting a single section to it.
We sometimes base whole cover stories on security topics, and you'll find security-related articles in our Know-How, Sysadmin, Programming, and even Community sections. You are probably right that our LinuxUser section, which focuses on the experience of the desktop user, might have less of a security emphasis than some of the other sections; however, we are always looking for good desktop security articles.
Perhaps more to the point, even if you are a casual or beginning user, we encourage you to delve into our Know-How and Sysadmin sections. Our goal is for every article to be useful for every reader.
Even if you aren't cooking up enterprise firewall configurations or implementing your own intrusion detection system, the concepts discussed in these advanced articles will still provide some insights on how to build a safer network.
As your article on the Jokosher audio editor in the April 2009 issue states, Jokosher is a work in progress. However I think you did a really good job of covering the things it does well currently. There were few criticisms in the article. I guess this means we are doing pretty well. I'm sure there are many things that could be a lot better. You can always let us know.
The article states:
"It is impractical and downright annoying that you cannot select multiple track takes to move them at the same time."
I found there is already a bug for this one, but I will make sure it is top priority for the next release.
Thanks for the good review.
Laszlo Pandy (Jokosher maintainer)
We were happy to provide our readers with this introduction to Jokosher. Certainly the open source world has a need for a free audio editor that is easy enough for amateurs, and Jokosher has lots of potential.
Buy this article as PDF
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm