Letters to the Editor
1. How come your January issue is on the Web and I still haven't received my December issue? Did it get lost in the mail or am I impatient?
2. Can you put more articles on-line for us paying subscribers? I paid my dues and feel like I am due the flexibility of reading online or on paper, please.
—RSVPAdam Holt firstname.lastname@example.org
1. The December issue was mailed one week late due to a problem at our printers, which set back printing, and therefore mailing, by one week.
The Table of Contents is posted to the WWW and Usenet as soon as an issue is sent to the printer; printing and mailing take another three to four weeks.
2. We are working on putting articles on-line, but our first priority is putting the magazine on paper. If we don't get the magazine on paper, there won't be one on the WWW, either. We are not over-staffed, and right now many of the articles you see already on our site were html-ized by volunteers. Our goal is to have the entire journal on on the WWW, and we are working towards that goal by creating tools that will allow us to work simultaneously on the paper and WWW versions of the articles. But that's another project which competes for time with the all-important process of getting the articles on paper.
We understand that you feel that we owe you having all the articles on-line; but it's not something we offer as part of the subscription, partly because we don't have the resources to provide that service in a timely fashion. We would like to suggest that you compare the WWW service that we provide now, with a full, interactive index, many of our previous articles, and response forms all available, with what we provided a year (and less) ago—no WWW service at all. Please understand that we are growing, and increasing our level of service as we grow, but it takes time.
I'm just writing to give you the current URLs and e-mail addresses for the Hungry Programmers stuff that were mentioned in the Lesstif and Viewkit article in the November issue of LJ.
The URL for the Hungry Programmer's homepage is now http://www.hungry.com:8000/
The URL for the lesstif stuff is now http://www.hungry.com:8000/products/lesstif/
The URL for the lesstif documentation project is now www.hungry.com:8000/products/lesstif/Lessdox/LessTif.html
The URL for the viewkit stuff is now http://www.hungry.com:8000/products/viewkit/
The e-mail address for the hungry programmers is now email@example.com
The address for the mailing list is also different than what was published in the article. It is now firstname.lastname@example.org.
An alert LJ reader, Robert Day, pointed out an error in the Find tutorial published in the December issue. The tutorial provided an incorrect example for using find to locate files with the SUID bit set.
The example was:
find / -perm 4000 -print
As shown earlier in the article, this command would find only files whose permissions are exactly 4000. The correct example is:
find / -perm -4000 -print
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide