Cyclades Corporation announced a new member of its Power Router family, the Cyclades-PR4000, a powerful, compact and cost-effective remote access server. It allows Internet Service Providers and Enterprise Network Managers to terminate both analog and digital calls and provide network access to remote offices, telecommuters and home users. The Cyclades-PR4000 is scheduled to ship in April. Contact Cyclades for pricing.
Contact: Cyclades Corporation, 41934 Christy St., Fremont, CA 94538, Phone: 510-770-9727, Fax: 510-770-0355, URL: http://www.cyclades.com/.
PerlDirect provides reliability, stability, support and accountability for Perl through the following features: validated, quality-assured releases of Perl and its popular extensions; advice and support; Y2K test suite; and a Perl Alert weekly bulletin. PerlDirect offers an opportunity to provide direct input to a leading organization involved in open-source development. Basic annual subscription rates start at $12,000 US.
Contact: ActiveState Tool Corp., PO Box 2870 Main Station, Vancouver, BC V6B 3X4, Canada, E-mail: email@example.com, URL: http://www.activestate.com/.
BASCOM announced the availability of its Internet Communications Server (ICS), an educational software/hardware solution developed for the OpenLinux OS from Caldera Systems Inc. for K-12 schools. BASCOM's use of OpenLinux provides the education vertical market with its first Linux-specific application. The ICS includes an access management engine, firewall security, proxy cache and software subscription service. ICS is available through BASCOM as a fully integrated, drop-in solution, as well as from BASCOM's OEM partner, Caldera Systems. Pricing for solutions in this line starts at $1,995 US.
Contact: BASCOM Global Internet Services, Inc., Phone: 888-922-2726, E-mail: firstname.lastname@example.org.
CTiTEK announced a new Linux network server installation. Server package includes labor (estimated 50 hours) and license costs (full version of Red Hat 5.2); hardware cost not included. Price is $3349.97 US for a 25-user Linux network server package.
Contact: CTiTEK, 14377 Woodlake Dr., Suite 311, Chesterfield, MO 63017, Phone: 800-860-9913, 314-878-9855, Fax: 314-878-9893, E-mail: email@example.com, URL: http://www.ctitek.com/.
CSM Proxy is a full-featured proxy and caching server, especially written to handle the various demands of network administrators. It can solve Internet connection needs in one simple package. Key features and benefits include SMTP command filtering, IMAP 4 proxy, HTTP cookie filtering, connection limits, automatic Netscape proxy configuration, remote administration over the Web and much more. CSM Proxy runs with any web server and does not require a web server on the same machine. Price is $695 US; version 4.1 update is $100 US. (Users who ordered after April 1, 1998 can upgrade to CSM Proxy 4.1 for free.)
Contact: CSM-USA, Inc., 360 South Fort Lane, Bldg. 1, Suite B, Layton, UT 84041, Phone: 801-547-0914, Fax: 801-546-0716, E-mail: firstname.lastname@example.org, URL: http://www.csm-usa.com/.
Empress announced Empress RDBMS's support for both 32-bit and 64-bit applications on Hewlett-Packard's HP-UX 11. Running under HP-UX 11, the Empress RDBMS offers application developers an environment which delivers high performance, reliability and optimized features for Internet computing. Empress Hypermedia, an Internet application development toolkit, is used for the creation of the actual web applications. Empress Suite for Linux includes Empress RDBMS (bundled with a C programming interface and Empress Report Writer) with host-level accessibility for enhanced performance tuning. Visit the web site for pricing or a free 30-day evaluation.
Contact: Empress Software, 6401 Golden Triangle Drive, Greenbelt, MD 20770, Phone: 301-220-1919, E-mail: email@example.com, URL: http://www.empress.com/.
Alta Technology Corporation announced the availability of M-Cluster, a compact and fully modular Linux-based clustered computing system for use in high-performance and complex data processing/analysis applications. The M-Cluster uses rack-mountable single-board computer and peripheral modules. M-Clusters are fully integrated with the Linux operating system, which implements Parallel Virtual Machine (PVM) and Message Passing Interface (MPI) technology. The Alpha, from Compaq, is currently available in M-Cluster systems with clock speeds of up to 500MHz. Pentium II processor versions will be available by the second quarter of 1999. M-Cluster systems are available with prices starting well under $20,000 US.
Contact: Alta Technology Corporation, 9500 S. 500 West #212, Sandy, UT 84070-6655, Phone: 801-562-1010, Fax: 801-254-4329, E-mail: firstname.lastname@example.org, URL: http://www.altatech.com/.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide