Linux news, trends, analysis and practical advice

fence cloud barrier chain link metal
pi book

apple orange

Nine ways to compare files on Unix

There are lots of ways to compare files on Unix systems and some of the choices are going to be just right for you

windows cloud

Windows as a service? Now, there’s an argument for Linux

Microsoft wants to control your Windows 10 desktop. Now are you ready to try a Linux desktop?

06 password

The secrets of password aging on Unix systems

It's not quite as hard as it sometimes seems


Humble Bundle lassos Python

Humble Bundle and No Starch Press have pulled together to offer a really sweet deal on digital books on Python.

vintage tech computer PC desktop antique 8-bit unix

How to learn Unix/Linux

Some tips for how to get started and how to stay on track for learning how to be a command line pro.

nww linux predictions slide 1

Lesser known but still handy Linux commands

Some of the less obvious Linux commands might still come in very handy from time to time


Unix tip: Using bash on Windows

The relatively new bash on Ubuntu on Windows brings some new possibilities to Windows users

linux distros 11

Which Linux distros should newbies use?

A fresh look at some of the more popular Linux distros (plus one non-Linux OS), and an impression of their ease of use.

future anesthetics ii

UNIX: Computers and art meet face-to-face

What do art and Unix have in common?

halt jochen spalding

There's more than one way to kill a Unix process

There are even more ways to kill a process on a Unix/Linux system than there are ways to skin a cat.

sniffing out martingreffe

Sniffing out Unix processes using pgrep

Easy ways to pull together important and interesting stats on your running processes -- using the pgrep command

Security online

Eleven-year-old root Linux kernel flaw found and patched

Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

sandra simpson

The many faces of grep

The everlastingly useful grep command can change its character in very interesting ways with the flip of a switch

System76 Ibex Pro

Meet the $114,725 Ubuntu server with eight Nvidia Tesla P100 GPUs

The Ibex Pro is one supercharged machine that will probably hurt your electric bill.

privacy policy

If you want privacy you need to run Linux

Windows is unsafe by design, and macOS isn’t a lot better. But even Linux distros that have joined the mainstream by becoming less scary are much safer.

linux security lick public domain

Self-protection is key to Linux kernel security

Finding and fixing Linux security vulnerabilities amounts to the usual whack-a-mole. The real solution is to harden the Linux kernel and let it protect itself.

Euclid -- screen capture

Details emerge about Intel's super-small Euclid computer for robots

Intel is getting proficient at developing small computers. First came the Compute Sticks and then credit-card Compute Cards. But there's nothing like the super-small Euclid computer for robots and more details have emerged on its...

Via Technology IoT

As with PCs, you can now customize Raspberry Pi-like computers

The Raspberry Pi 3 is a great product, but it can't be customized. Users may want more storage or a faster processor, but have to settle for what's on the board computer.

Load More