Write for Linux Journal
We always are looking for contributed articles. Only by accepting articles from a variety of Linux users involved firsthand in the projects they write about can we do justice to the many areas in which people are applying Linux and the software that runs on it.
We mainly run tutorial articles for all levels of expertise. Someone who is an expert on Verilog may be starting out on a sound editing application, so not all introductory articles are for new users only. We always appreciate good introductions to new and useful software.
We also are looking for real world stories. If you are using Linux to do something unusual or if you are using Linux on a large scale, many people would like to read your story in Linux Journal. Our readers rely on Linux Journal to show them when Linux becomes a good choice for new kinds of projects. So, if you're the first person you know to do something on Linux, please let us know.
You do not have to be a professional writer to write for Linux Journal. If you have written informative Web pages or helped users succeed with their Linux projects by posting good answers to mailing lists, you have the basic writing skills needed to become a Linux Journal author.
Please read our author's guide, and send us e-mail if you have an idea for an article. Be sure the subject line contains descriptive words, such as "C compiler article", to help us when sorting through submissions.
- Please read our LJ Author's Guide for more information.
- Here are topics with specific due dates that we are interested in.
- Here are topics without specific due dates that we are interested in.
- Public relations professionals, please read our LJ PR Guide for information on working with us effectively.
- Vendors, please click here for information on submitting products for review.
Subscribe now!
The Latest
Newsletter
Featured Videos
Linux Journal Live - December 4, 2008
December 5th, 2008 by Shawn Powers in
Secure VOIP communication with ZRTP
December 4th, 2008 by Elliot Isaacson in
Phil Zimmermann comes to the rescue again with ZRTP, a protocol for securely transferring keys across a VOIP network.
Recently Popular
From the Magazine
January 2009, #177
It's a battle as old as time: good vs. evil. Fortunately, Linux and FOSS are on our side as we wage the battle against those who try to steal our secrets and invade our systems.
Checking your system's security is best done sooner rather than later. Test the locks with our article on security verification; find out how to use PAM to help secure your systems; use MinorFS and AppArmor to implement discretionary access control; learn more about Samba security in part III of our series; use Darknet to help detect bots and secure your systems; use the Yubikey to increase your site's security; and don't forget to lock the doors, because a cold boot attack could render your security useless if somebody has physical access to your computer.
But, we're not just about sowing the seeds of fear. We also show you how to use memcached in Rails, how to manage multiple servers efficiently, how to deploy applications easily with Capistrano, how to manage your videos with MythVideo, how to mix it up a bit (your audio that is), and even play a few games.









