Features

Rolling Versus Point Releases

Meet in the Middle

Nov 06, 2024

Which is better: distributions that develop using point releases or those that use rolling releases?

Web Heist

Hijacking browsers with BeEF

Sep 27, 2024

Bits of JavaScript from a malicious website can put your browser in a trance. A tool called BeEF encapsulates that power in a most diabolical way, providing yet another reason to avoid unknown links and keep your browser up to date.

No Hands!

Automatic installation with Ubuntu 22.04 and cloud-init

Sep 27, 2024

The new automatic installation method rolled out with Ubuntu 22.04 borrows some tools from the cloud configuration toolbox. We'll show you how to get started.

Video Converter

Transcode your video library with ease

Sep 27, 2024

You can set up an automatic transcoding tool with CasaOS, HandBrake, FileBrowser, and HAProxy, to transcode your video library with ease. We show you how to get started.

Alternate Interface

A Column-Based Dashboard for Bluesky

Dec 09, 2024

If you've switched to Bluesky but miss the old Twitter TweetDeck interface, deck.blue has you covered.

Through the Back Door

Anatomy of a Linux backdoor attack

Oct 25, 2024

Cybercriminals are increasingly discovering Linux and adapting malware previously designed for Windows systems. We take you inside the Linux version of a famous Windows ransomware tool.

Rust on a Device

Make your microcontroller apps safe and secure with Rust

Oct 25, 2024

Rust, a potential successor to C/C++, claims to solve some memory safety issues while maintaining high performance. We look at Rust on embedded systems, where memory safety, concurrency, and security are equally important.

Power Package

A look at the TUXEDO InfinityBook Pro 14

Dec 04, 2024

A high-end compact laptop with Linux support out of the box.

Block Tech

Preserving privacy by encrypting block devices

Oct 25, 2013

The recent revelations about NSA spying have sparked renewed interest in data encryption. Encrypting at the file level is quick and easy, but if you're looking for an extra dose of protection, try encrypting the whole block device.

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News