You’re not being paranoid: hackers really are out to get you (and everyone else) and exploit you for profit. Cybercrime is already a huge problem. A survey for
Ever wondered what those mysterious * and & symbols mean and how they’re used? Wonder no more. WHY DO THIS? When reading someone else’s code, you’ll never need
Issue 17 of Linux Voice is nine months old, so we’re releasing it under the Creative Commons BY-SA license. You can share and modify all content from the
Explore a way to beautiful documents that doesn’t involve learning a whole set of macro commands. Why do this? Make the Latex learning curve a little shallower Produce
Repetition is the sysadmin’s bane. That’s why we have Puppet, an ingenious system for configuring multiple machines at once. Why do this? Automate repetitive jobs Quickly roll out
Use standard Linux tools to hide data so well that even Alan Turing would be stumped. Why do this? Create the ultimate device for hiding encrypted data Keep
Peek inside your machine to find out how it transmits data packets. In issue 6 of Linux Voice we implemented a simple server using the TCP protocol, which
Sail through moments of anguish and despair brought about by failed disks by backing up your data in multiple locations. The Linux ecosystem has lots of command line