Linux Format

Learn more with Linux

Buy it now!
Read a sample

To quote Natalie Portman, “Learning is beautiful.” Isn’t that the truth? If you’re reading Linux Format, you undoubtedly have the same sentiment; that’s the beautiful thing about using Linux and open source – the continuous learning curve. Just as you think you’ve mastered one area, a whole new technology appears for you to tackle.

With the Raspberry Pi Foundation’s mission to push coding into the curriculum, Linux powering more areas within schools, and open source becoming an increasingly important area, we’re dedicating our back-to-school issue to explaining how you can use Linux, open source and low-cost single-board PCs to power your own and children’s education at school.

read more

A virtual world

Buy it now!
Read a sample

We expect virtualisation isn’t anything new to you, our happy reader, but it’s a topic that’s constantly evolving, improving and has become essential to a world that expects the ability to spin up multiple instances remotely in seconds. So this issue we’re holding your hand and taking you through the vital basics of creating a VirtualBox, getting more from managed snapshots to newer Docker Containers and cutting-edge development of GPU passthrough. So by the end of this issue you should feel you know your KVMs from your kernel chroots.
Even if you’re just using VirtualBox to keep a sneaky install of Windows hidden away (admit it, you know it’s true), the copious amounts of storage and computing power that even a modest PC offers can happily cope with storing and running multiple instances. It’s just a matter of knowing the best approaches, and is another fine example of how open source technologies have come to rule this admittedly virtual world.

read more

Escape Windows! (again)

Buy it now!
Read a sample

Don’t use Linux because it’s free, but because it frees you and your hardware. We’re not here to bash Windows, we’re here to give you choice. When you buy a Mac you have to run MacOS. Buy a PC and you’ll be steered in the direction of Windows 10. I’m not even going to mention tablets, phones, TVs and even cars. All are examples of companies attempting to lock-in consumers to a walled software ecosystem. When you own the hardware, why is the software you can run being dictated to you?
The PC is a general-purpose computing engine. It should and usually can run any software you like – though recent examples show even the PC is being walled off through its firmware. That’s where open source Linux-based OSes come into play.
If you believe you shouldn’t be locked out of hardware that you own, then that’s just one reason open source software is so vital to the world. For us older types, another reason is the fun of getting to play with the inner workings of the OS – something that modern devices and their OSes are making increasingly difficult.
Even if you don’t accept the privacy and spying arguments for open hardware and software, surely having full ownership and control over the devices you buy is important? I feel you shouldn’t have to be beholden to huge corporations to do basic computing, worry about what personal information they’re retaining, or forced to use specific types of software.

read more

Shields up!

Buy it now!
Read a sample

Companies that market products like to talk about the “threatscape”. Long gone are the days when someone might be coding a virus for fun, as an experiment or to see if they could get it to propagate widely enough to gain some notoriety and online kudos in equal measure. Yet for the majority of Linux users there’s not even a threat of traditional malware, be it spamming toolbars into your browser or trying to monitor what you do. Today, the threatscape is more directed at online systems, which can be attacked directly using any known weakness and then typically hit with ransomware. This, alongside social engineering attacks – in terms of phishing emails – are the biggest threats that most standard users face today.
That’s the guiding light for the 2017 edition of the Linux Format Learn to Hack guide. By looking at the methods and techniques hackers use to attack systems, we can learn how to plug holes and protect those systems. It feels like it’s been at least a little while since the last major security hole appeared after the torrent filled 2016. Though having just written that, both Sod and Murphy’s law will now apply...

read more