The Wayback Machine - https://web.archive.org/web/20081217085814/http://www.linuxjournal.com:80/xstatic/author/index
Quantcast

Write for Linux Journal

 

We always are looking for contributed articles. Only by accepting articles from a variety of Linux users involved firsthand in the projects they write about can we do justice to the many areas in which people are applying Linux and the software that runs on it.

We mainly run tutorial articles for all levels of expertise. Someone who is an expert on Verilog may be starting out on a sound editing application, so not all introductory articles are for new users only. We always appreciate good introductions to new and useful software.

We also are looking for real world stories. If you are using Linux to do something unusual or if you are using Linux on a large scale, many people would like to read your story in Linux Journal. Our readers rely on Linux Journal to show them when Linux becomes a good choice for new kinds of projects. So, if you're the first person you know to do something on Linux, please let us know.

You do not have to be a professional writer to write for Linux Journal. If you have written informative Web pages or helped users succeed with their Linux projects by posting good answers to mailing lists, you have the basic writing skills needed to become a Linux Journal author.

Please read our author's guide, and send us e-mail if you have an idea for an article. Be sure the subject line contains descriptive words, such as "C compiler article", to help us when sorting through submissions.


Newsletter

Each week Linux Journal editors will tell you what's hot in the world of Linux. You will receive late breaking news, technical tips and tricks, and links to in-depth stories featured on www.linuxjournal.com.
Sign up for our Email Newsletter

Featured Videos

The December 4, 2008 Linux Journal Live!. Shawn Powers and Kyle Rankin take your Linux Questions.

From the Magazine

January 2009, #177

It's a battle as old as time: good vs. evil. Fortunately, Linux and FOSS are on our side as we wage the battle against those who try to steal our secrets and invade our systems.

Checking your system's security is best done sooner rather than later. Test the locks with our article on security verification; find out how to use PAM to help secure your systems; use MinorFS and AppArmor to implement discretionary access control; learn more about Samba security in part III of our series; use Darknet to help detect bots and secure your systems; use the Yubikey to increase your site's security; and don't forget to lock the doors, because a cold boot attack could render your security useless if somebody has physical access to your computer.

But, we're not just about sowing the seeds of fear. We also show you how to use memcached in Rails, how to manage multiple servers efficiently, how to deploy applications easily with Capistrano, how to manage your videos with MythVideo, how to mix it up a bit (your audio that is), and even play a few games.

Read this issue

Morty Proxy This is a proxified and sanitized view of the page, visit original site.