Tech Blog

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balanc...

Saturday marks the 20th Anniversary of open source, sort of. Open source led to a new software development and distribution model that offered an alternative to proprietary software. No single event takes the prize for starting the technology revolution. However, Feb. 3, 1998, is one of the more sig...

As much as I love to poke at the inner workings of my computer, I'll admit that until recently, I didn't give much thought to which version of the Linux kernel my desktop system was running. For most desktop users, this isn't odd. Compatibility of kernel modules is often critical for servers and pro...

HOW TO

Take Linux and Run With It

"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offe...

We often talk about hybrid cloud business models, but virtually always in the context of traditional processor-bound applications. What if deep learning developers and service operators could run their GPU-accelerated model training or inference delivery service anywhere they wanted? What if they co...

There is more to the shell, the terminal's interpreter software, than commands composed of alphanumeric characters. In addition to those familiar programs, there is a whole host of processing tools hiding behind the symbols of a standard keyboard. To say nothing of their incredible potency in combin...

Microsoft this week became a premium sponsor of the Open Source Initiative, adding more financial heft to its growing commitment to the open source software movement. The company's new financial support will not translate into any special influence in the organization's decision making, noted OSI Ge...

Linux offers so much for users to sink their teeth into that even among desktop and more casual users, it's easy to get caught up in the tradecraft. It's only too tempting to put your system's technical capabilities to the test by trying out a new program or practicing a new command. As with any oth...

Regular readers know that I usually stick to the well-charted territory of essential terminal commands and practical overviews of Linux history, since they are immediately useful to newcomers. Thankfully, the basics don't change very quickly -- but that's not to say that Linux is a stagnant ecosyste...

If you've been using Linux for any length of time, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there's much more to ...

As daunting as securing your Linux system might seem, every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. Fortunately, there are a few basic techniques that greatly benefit users at all levels, and knowing how to securel...

Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the ...

A technician hurriedly slings his backpack over his shoulders, straps on his M9 pistol, and bolts out of the transport with his squad of commandos in a hail of gunfire. As soon as his team reaches the compound, he whips out a laptop and starts deploying a rootkit to the target server, bullets whizzi...

LinuxInsider Channels