Current_Issue.tar.gz - Entertainment, Open-Source Style
Anyone who ever has been to a Linux or open-source conference knows that Linux geeks know how to have fun. Whether it's a late-night Atari 2600 fragfest (Penguicon 2009) or the SourceForge parties at OSCON (pretty much every year, from what I can tell), Linux is not just for work. We figured Linux Journal shouldn't just be for work either, and with summer right around the corner, we decided to dedicate this month to entertainment. Oh, and if you are reading this in the southern hemisphere? Well, summer is right around the corner for you too—it's just a larger corner!
Reuven M. Lerner starts out the issue with an article on MongoDB. I suspect he chose the topic because MongoDB is an entertaining name, but whatever Reuven's motivation, MongoDB is an interesting non-relational database. This month, he shows us how to install and work with Mongo. Next month, we'll get down and dirty with it. Dave Taylor, on the other hand, gets down and dirty this month with HTML forms and shell scripts. If that sounds like an odd mix, be sure to check out his column, because Dave is doing some cool things with seemingly mundane HTML forms.
If you're like me, entertainment generally means either reading a book or watching TV. When you're a Linux user, watching TV probably is a bit more geeky than it is for the rest of the world, and this issue, we have a lot of toys to cover. We start with Dirk Elmendorf's Economy Size Geek column. I've talked about the Roku device several times in past issues, and although it's unlikely my pleading is what got the company to open up development for its product, for whatever reason, Roku decided it was time. Dirk shows us how to create custom channels for the Roku and explains how to install them for your Roku-riffic enjoyment. If the Roku isn't up your alley or, at the very least, isn't in your entertainment center, perhaps Michael J. Hammel's article comparing MythTV and XBMC is more your cup of tea. Both programs are designed for consuming multimedia, and both programs are amazingly awesome. Michael does the heavy lifting for us, and he shows the ins and outs of these highly functional, if not slightly different, programs.
In order to enjoy a video on your computer or living-room entertainment center, it's important to get that video in a format that is playable. Anthony Dean shows us Handbrake this month, which does a great job of converting DVDs into formats playable on pretty much every device on the planet. I use Handbrake to convert DVDs so I can watch them on my Nokia N900, which obviously doesn't have a DVD player of its own. Although Handbrake will convert videos for the N900, playing movies certainly is not all the little handheld computer is capable of doing. Kyle Rankin has a review this month of his N900, and you'll want to check it out.
It's possible television really isn't your idea of entertainment. We totally understand that. Whether you just want to play music, or you want an entire orchestra in your laptop, we've got you covered. Dave Phillips looks at L20rk, which is much more than a bunch of MIDI files playing together like an orchestra. Maybe that's more than you're up for, and you just want to listen to music on your computer. Sometimes the hardest part is choosing which program to use for the playing. Windows and Macintosh users generally choose between WMP and iTunes, but in Linux, we have a wide variety of players. This month, Bruce Byfield breaks down five of the more common ones for us. Even if you are a die-hard XMMS fan, you'll want to check out Bruce's article comparing Amarok, Banshee, Exaile, Rhythmbox and Songbird.
Finally, we realize many of you are cyborgs and have little interest in human entertainment. Or, perhaps you're just the type of person who prefers to secure your network for fun. Well, we care about you too, and Mick Bauer and Kyle Rankin will keep you entertained this month with the continuation of their articles on OpenVPN and network troubleshooting. When you add the product reviews, UpFront articles, New Products and Doc Searls' look at distribution models, we have an issue that is certain to please. Hopefully, it will even entertain. As for me, I'm getting ready for Penguicon 2010. Although I don't think we'll have another Atari 2600 battle, I'm sure it will be great. With a bunch of Linux geeks, it's hard not to have fun!
Shawn Powers is the Associate Editor for Linux Journal. He's also the Gadget Guy for LinuxJournal.com, and he has an interesting collection of vintage Garfield coffee mugs. Don't let his silly hairdo fool you, he's a pretty ordinary guy and can be reached via e-mail at firstname.lastname@example.org. Or, swing by the #linuxjournal IRC channel on Freenode.net.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide