Focus: Home Applications and Linux on the Mac
Use of Linux continues to grow in all computing markets. Over The past few years has seen Linux grow fastest in the server market, where it currently owns 31% of the market (compared to 24% for Windows NT). Today, it appears that Linux is growing fastest in the Embedded Systems market. In fact, next month's issue of LJ will focus on that market. Look forward to an article on the Helius router. Learn about “plain Linux”, Yopy and much more.
In this issue, we have a double feature: we look at using Linux at home, and on the Macintosh. Certainly, a home Linux system could be running on a Mac, so the two subjects fit together well. Using Linux in the home is vital to its growth. Having a version of Quicken for Linux is a necessary step forward. In this issue, Ralph Krause details various options for personal finance management.
Setting up Linux to run on a Mac opens up the wonderful world of Linux to a whole new set of users. You don't necessarily need to throw that Mac away—learn how to install Linux, instead! Stew Benedict and Richard Kinne explain procedures for installing and configuring a Mac to run Linux.
While our features are here to address the issue focus, you might want to remember that Linux is Linux. That is, Linux at work, Linux at home and even Linux on a server is all the same basic Linux. Even if your only interest is in running Linux at home, much of what you will see in Linux Journal applies as well. Our Linux Apprentice column, for example, contains useful information and tips—no matter where you run Linux. This month we learn how to configure a heterogeneous Linux/Windows home network. Book and product reviews always contain much information. Root through our reviews of routers, Wordperfect Office 2000 Deluxe, OpenLinux eDesktop 2.4, Imagestream routers and much more. And don't forget this month's Take Command, which explains the klogd kernel logging dæmon. All this in just one issue of LJ! Read on.
Our first focus article on the Mac side is by Stew Benedict: Yellow Dog Linux on the iMac. Yellow Dog is a port specific for the Mac, and Stew takes you through his experiences of getting Yellow Dog up and running.
Our other Mac feature is Richard Kinne's piece on Linux on the PowerPC. Richard discusses the various distribution choices for the Mac, and then goes on the concentrate on the LinuxPPC package. With commercial applications for LinuxPPC lagging behind their counterpart for the x86 platform, Richard explains why a Mac user of Linux isn't out in the cold.
Our third feature looks at finance programs available for Linux. Reviewed packages include cbb, Moneydance, QHacc, gAcc and GnuCash. The article is a great guide to your options and includes information on file compatibility with the de facto QIF format.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide