Letters to the Editor
Thanks! Jawed Karimi's September 1998 LJ article (“Porting MS-DOS Graphics Applications”) on basic graphics got me going in the right direction with SVGALIB. (I am a Linux newcomer and had never heard of it before then.) Sometimes, short and sweet articles are the best.
—John E. McGovney firstname.lastname@example.org
I'd like to mention that I disagree with author John Blair regarding his article “Samba's Encrypted Password Support” in the December 1998 issue.
In the last paragraph, he states “Finally, to allow users to update their encrypted password, set the permissions on smbpasswd to be setuid root ..”.
This should not be necessary, since smbpasswd acts like an SMB client, asking over an SMB session to change a user's password. This is the reason you should include in smb.conf the “allow hosts = 127” line, or leave it blank.
I have also used pam_smb, which can be found on the main Samba FTP site, so that other services can authenticate with Samba. On my system, my users all have their passwords in /etc/shadow “starred” (*).
About the magazine, it's great!
—Celso Kopp Webber email@example.com
The “free” controller shipped with a lot of scanners is the Symbios 53C400A. It is not, as the writer of the reply (“Best of Technical Support”, January 1999) suggested, 53c8xx compatible but is instead a 5380 variant.
It is supported by current Linux 2.1.x series kernels, although its lack of an IRQ and 8-bit ISAness make it a good candidate for the bin, not a multiuser OS.
There is an equivalent patch for 2.0.x in the SANE mail archive.
—Alan Cox firstname.lastname@example.org
I think the supplement is a very good idea-I very much enjoyed this special issue.
I would like the addition of a Table of Contents as in the regular issues. This would be helpful because I (and perhaps others) photocopy the Tables of Contents and put them in a three-ring binder, where they are easier to scan than the issues themselves.
Thanks for an excellent publication.
—Ray Liere email@example.com
One of the weird rules of the Post Office is, if it has a table of contents, it cannot be called a supplement. Go figure —Editor
I just wanted to say “Thank you” to all at LJ who did such a great job presenting my article in February. The magazine keeps getting better and better.
By the way, my bio states that I maintain the “official” Linux Csound, but that is no longer true. As of late 1998 I have worked mainly with the development version available from Nicola Bernardini's site at AIMI. The official version is currently maintained at Bath by John Fitch.
Best of the New Year to all of you!
—Dave Phillips firstname.lastname@example.org
For years I've maintained a dual boot machine at home with both Windows 95 and Linux because my spouse didn't feel she could learn the intricacies of Linux. So, it was a great pleasure to see KDE chosen in your 1998 Reader's Choice poll. It was with KDE and StarOffice that I finally won her over to the good side.
The ease of a standard desktop which was more intuitive than Windows 9x has her singing its praises. I thought I would never see the day. It should be pointed out that a big turning point for her was the day she accidentally started three different StarOffice sessions and was amazed that the system didn't crash. It did take awhile for those monsters to load, but once they finished, she was back in business. Windows 9x would have died at this point.
Now all I need is to find a calendar program which comes close to Calendar Creator Plus and Windows 9x will just be a bad memory in our house. Maybe korganizer will fill the bill when it's completed.
—Randy Kyrk email@example.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide