Quantum Cryptography

Classical cryptography provides security based on unproven mathematical assumptions and depends on the technology available to an eavesdropper. But, these things might not be enough in the near future to guarantee cyber security. We need something that provides unconditional security. We need quantum cryptography. more>>

Posted by on 22 April 2014 | 12:32 pm

Command-Line Cloud: gcalcli

If you follow my columns in Linux Journal, you probably are aware that I'm a big fan of the command line. When it comes to getting things done efficiently, most of the time the command line can't be beat. more>>

Posted by on 21 April 2014 | 1:12 pm

Image Manipulation with ImageMagick

I've spent a lot of time in my column talking about text processing and analysis, with the basic assumption that if you're using the command line, you're focused on text. more>>

Posted by on 17 April 2014 | 12:46 pm

Non-Linux FOSS: Angry IP

The de facto standard for port scanning always has been the venerable Nmap program. The command-line tool is indeed very powerful, but I've only ever seen it work with Linux, and every time I use it, I need to read the man page to figure out the command flags. more>>

Posted by on 16 April 2014 | 4:12 pm

Encrypting Your Cat Photos

The truth is, I really don't have anything on my hard drive that I would be upset over someone seeing. I have some cat photos. I have a few text files with ideas for future books and/or short stories, and a couple half-written starts to NaNoWriMo novels. It would be easy to say that there's no point encrypting my hard drive, because I have nothing to hide. more>>

Posted by on 15 April 2014 | 2:28 pm

Numerical Python

For the past few months, I've been covering different software packages for scientific computations. For my next several articles, I'm going to be focusing on using Python to come up with your own algorithms for your scientific problems. more>>

Posted by on 11 April 2014 | 1:25 pm

Speed Test for Nerds

Most people with Internet access in their houses have visited a speed-test Web site to make sure they're getting somewhere close to the speed they're overpaying for. I'm paying more than $100 a month for my business-class connection from Charter, so on a regular basis, I make sure I'm getting the advertised speed. more>>

Posted by on 10 April 2014 | 2:46 pm

DNSSEC Part II: the Implementation

This article is the second in a series on DNSSEC. In the first one, I gave a general overview of DNSSEC concepts to lay the foundation for this article, which discusses how to enable DNSSEC for a zone using BIND. more>>

Posted by on 8 April 2014 | 4:11 pm

Pro Video Editing with Pitivi

Several decent video editors are available on the Linux platform. Kdenlive, OpenShot, Cinelerra and Pitivi are those that come to mind as "big players" in an admittedly small market. I've used them all through the years, with varying levels of success. more>>

Posted by on 7 April 2014 | 1:00 pm

Android Candy: Control-Z for Your Phone!

I never have a Twitter app crash in the middle of a Tweet. That wouldn't be too terrible to deal with. No, for me, it seems my e-mail application decides to crash after I've spent 20 minutes thumbing out a reply while sitting in a crowded airport. If you've ever lost a love letter, term paper, shopping list or world-class Facebook post, Type Machine is the perfect app for you. more>>

Posted by on 3 April 2014 | 11:52 am

Opening Minds to the Spheres Among Us

Flatland, an 1880 novella by Edwin A. Abbott, is about a world with just two dimensions, inhabited by lines and polygons. Trouble starts when a sphere shows up. more>>

Posted by on 2 April 2014 | 12:07 pm

April 2014 Issue of Linux Journal: High Performance Computing

Big Block Linux with a Four-Barrel Hemi We often brag about how few resources Linux needs to operate: a Raspberry Pi or Beagle Board, in a Web browser (

Posted by on 1 April 2014 | 3:33 pm

More Secure SSH Connections

If you need remote access to a machine, you'll probably use SSH, and for a good reason. The secure shell protocol uses modern cryptography methods to provide privacy and confidentiality, even over an unsecured, unsafe network, such as the Internet. more>>

Posted by on 31 March 2014 | 2:45 pm

Split Testing

It's nice to have many people visit your Web site. It's even better when people don't just come to your site, but also enjoy your content. But, best of all is when visitors to your site do what you would like them to do—sign up for your newsletter, register for your SaaS application or buy one of your products. more>>

Posted by on 27 March 2014 | 3:55 pm

LVM, Demystified

I've been a sysadmin for a long time, and part of being a sysadmin is doing more than is humanly possible. Sometimes that means writing wicked cool scripts, sometimes it means working late, and sometimes it means learning to say no. Unfortunately, it also sometimes means cutting corners. I confess, I've been "that guy" more than once. A good example is SELinux. more>>

Posted by on 26 March 2014 | 1:30 pm