Linux Mint 22.3 Now Available with New Tools
Linux Mint 22.3 has been released with a pair of new tools for system admins and some pretty cool new features.
Linux Mint 22.3 has been released with a pair of new tools for system admins and some pretty cool new features.
VoidLink, a new Linux malware, should be of real concern because of its stealth and customization.
Both Gnome and Firefox have proposed getting rid of a long-time favorite Linux feature.
If you want to stick with X.Org, you'll be limited to the desktop environments you can choose.
While modern software centers prioritize simplicity, Synaptic stands out for its comprehensive control over package management.
If you're processing a group of files in a single command pipe, the xargs tool just might save you some precious execution time.
Every pen test begins with information gathering. Give yourself a head start with the Shodan search engine and its powerful toolkit.
Video codecs help reduce bandwidth and save storage space. We compare AVI and VVC to help you decide which one is right for you.
Linux users bristle at the whole idea of getting "tracked," but pixel tracking is built into the very foundation of the commercial web. We examine the dark art of pixel tracking and tell you about some tools that will keep the trackers at bay.
The term "vendor lock-in" has been in common parlance for as long as I've been working on this magazine. We don't talk about vendor lock-in as much as we used to, but everyone knows it is still out there, operating in evermore subtle ways to take choice away from users.
Mike Schilli analyzes the accounting data exported from the YNAB financial tool to discover where his hard-earned money is going.
Experts use tools such as bc and dc for arithmetic in the shell. The num-utils and datamash packages open up further opportunities for processing numerical values at the command line.
Gemini CLI helps you write, debug, and test your code, all from the command line.
Multi-factor authentication and hardware security keys can help keep your information safe.
Learn how to enable a microcontroller's USB interface and exchange data with a host Linux machine. We'll first emulate a serial port, then build a pen-drive-type device, and finally create a fully custom data transfer interface.
This month in Linux Voice and Elvie.
Nate explores Devuan 6.0, SparkyLinux 8.1, Zorin OS 18, and BesGnuLinux JWM 3-1.
Rather than emulating the old hardware to play games, engine remakes allow you to combine the original assets with modern conveniences.
Curious about the planes that fly over your home? With some simple and affordable equipment, you can receive their ADS-B signals and uncover detailed flight information.
The Terraform orchestration tool lets you create a remote desktop configuration that you can easily bring up and tear down, which could save you money and add flexibility to your environment.
Nate explores the top FOSS including the latest version of Waterfox Browser, an image metadata removal tool, a lightweight media player, and the latest LibreQuake beta.
With bandwhich, you can quickly see the current network load on your computer.
In the news: Two New Distros Adopt Enlightenment; Solus Linux 4.8 Removes Python 2; Zorin OS 18 Hits over a Million Downloads; TUXEDO Computers Scraps Snapdragon X1E-Based Laptop; Debian Unleashes Debian Libre Live; Valve Announces Pending Release of Steam Machine; and Happy Birthday, ADMIN Magazine!
Chronicler Zack Brown discusses AI in the kernel.
With a new CEO in control, Mozilla is doubling down on a strategy of trust, all the while leaning into AI.
If you're a developer wanting to create a new Gnome extension, you'd best set aside that AI code generator, because the extension team will have none of that.
Yet another distro is making the move to the KDE Plasma desktop.
TUXEDO Computers has released the fourth generation of its Gemini laptop with plenty of updates.
With the right tool and a bit of artistic talent, you can create two-dimensional cartoons, even without Flash. In this article, we present four animation programs and look at how well they perform in practice.
Putting all virtualization tasks on a separate server saves significant resources on the client. phpVirtualBox makes it possible to create, configure, manage, and use remote VMs in a browser window.
XML security problems are numerous, but you can take steps to limit your exposure β or you can use a different standard.
Even state-of-the-art computers need to use clever methods to process ever-increasing amounts of document data. The open source Lucene framework uses inverted indexing for fast searches of document collections.
USB sticks and SD cards quickly lose their value, but if a script distributes the data across several such devices, flash memory is still useful as a fast and shockproof backup medium despite limited capacity.
KDE SC 4.10 was released six months after KDE 4.9, adding many new features. In the background, work is in full swing for the next generation, KDE Frameworks 5: a KDE based completely on Qt5 and QML.
The mysterious /proc virtual filesystem is a rich mine of information about everything in your system.
Dynamic resource allocation and migration of virtual machines between hosts mean that VMware environments pose new monitoring challenges. A new version of the free OpenNMS network management tool now includes an option for monitoring VMware-based infrastructures.
Like any self-respecting Linux journalist, I'm often predisposed to take Microsoft to task. For the record, I do manage to spread it around, with occasional reflections on Apple and Google, because I truly believe our universe has room for more than one evil empire. But Microsoft is still the easiest mark.
We look at what makes a security issue critical and how upstream developers and vendors respond by examining three incidents: CVE-2013-0156, CVE-2013-0333, and rubygems.org. Moreover, we look at improvements that can make security better in the future β specifically, incident response handling.
Apache HTTP Server version 2.4 is full of exciting new features. We share a few of them with you.
In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping options on Linux and introduce the support in Linux for the Volatility Analysis Framework.
Thanks to protocols such as UPnP and DLNA, video, audio, and photos are distributed to TVs, gaming consoles, PCs, and smartphones without the need for configuration. Linux as a central media server is a welcome guest.
A Perl script calls various plugins that sniff around on FTP and HTTP servers run by the major Linux distributions to discover when Fedora, Debian, and other distros update their packages.
Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural β that is, in its configuration.
The market for good image editing programs for Linux is pretty much saturated. Despite this, BrainDistrict has dared to launch two commercial programs: IFX-Supreme and PaintSupreme.
During the ongoing battle against spam, admins should inspect their troop's battle lines from time to time. If you don't relish the thought of counting the dinnerware, you can use the services of a logfile inspector like SendmailAnalyzer, which works surprisingly well with Postfix and the like.
Simon is a sophisticated speech recognition tool with easy access to two powerful speech recognition engines, Julius and CMU Sphinx.
In addition to its comprehensive tool set, LibreOffice packs a built-in Basic-like scripting language that can be used to automate repetitive tasks and extend the suite's default functionality.
Defragfs optimizes files on a system, allowing videos to load faster and large archives to open in the blink of an eye.