Linux Journal will be hosting the Linux International Users Conference at the 6th Annual Open Systems World/FedUNIX '94. The event is being held at the Washington Conference Center, Washington, D.C, during the week of November 28, and the two-day Linux Confer-ence will be on Thursday and Friday, December 1-2.
Eight other conferences will be held during the week, including Federal Open Systems Conference, Motif/COSE International Users Conference, Novell AppWare Developers Conference, SCO Interoperability Confer-ence, Solaris Developers Conference, Windows NT Developers Conference, and the Word Wide Web/Mosaic Users Conference. The event is expected to attract over 10,000 attendees, so this is a great opportunity for Linux to show its stuff!
The Linux Track will include tutorials, panel discussions and presentations by some well-known personalities in the Linux Community, including Bob Amstadt, Eric Youngdale, Don Becker, Phil Hughes, Przemek Klosowski, Dirk Hohndel, Michael K. Johnson, David Wexelblat, and Matt Welsh. Sessions will cover the history of Linux, Linux and the Internet, Wine, the commercial future of Linux, Linux and NASA, legal implications of using and developing tools and applications on Linux, iBCS2 compatibility, X Windows System on Linux, a clinic for the novice user, and how to convince your boss/employer/customer to use Linux.
There will be Birds of a Feather sessions at the hotel on Thursday evening, with discussions on systems administration, Internet connectivity, and hackers; fun with Linux.
If you would like more information, contact us at Linux Journal, call Open Systems World at (301) 953-9600, or try URL:www.mcsp.com/OSW-FedUNIX.html.
One short week after the Open Systems World event in the United States, the International Symposium on Linux will be held in Amsterdam. The RAI Congress Centre is the place, December 8 and 9 are the dates, and the organizers are Frank B. Brokken, Karel Kubat, and Piet W. Plomp of the ICCE, University of Groningen.
Current information about the symposium is available via anonymous ftp at beatrix.icce.rug.nl in the directory pub/symposium. It is refreshed daily, and contains a list of speakers, a list of interested attendees, and information about local hotels. The organizers of the symposium can be reached at firstname.lastname@example.org.
Some of the twenty-five speakers already scheduled include Bob Amstadt, Remy Card, Michael K. Johnson, Linus Torvalds, Theodore Ts'o, and Matt Welsh. Formal lecture topics include “Viability of Linux”, Ham radio and Linux, “Typesetting, X and MS-Windows”, “Linux and UnixWare; a comparison”, “Linux in Biostatistic Research”, “Development of Linux and the Role of the Expert Community”, “Onyx”, Wine, “Programming in a Multi-Threaded Environment”.
People without Internet access can reach ICCE at:
ICCE, Univ. of GroningenP.O. Box 3359700 AH Groningenthe Netherlands(+31) 50 63 36 47
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide