For reviews of Linux chess interfaces see http://www.firstlinux.com/articles/chess/.
Percentage of computers that have been kicked or mauled by their users: 25
Size in billions of dollars of Microsoft's cash hoard, as of May, 2001: 30
Rate in billions of dollars/month at which Microsoft's cash hoard is growing: 1
Percentage increase in Microsoft's stock price in 2001 through May 30: 62
Number of possible simultaneous conversations possible when Marconi made his first xmission: 1
Number possible now, in trillions: 1
Years in which this number doubles: 2.5
Number of square kilometers of land in the world: 148,940,000
Number of simultaneous conversations per square kilometer: 6,714
Number of pages Google finds containing the phrase “open source”: 1,930,000
Number of pages Google finds containing the phrase “free software”: 1,150,000
Number of pages Google finds containing the phrase “Eric Raymond”: 26,100
Number of pages Google finds containing the phrase “Eric S. Raymond”: 30,100
Number of pages Google finds containing the phrase “Richard Stallman”: 54,300
Number of pages Google finds containing the phrase “Richard M. Stallman”: 11,600
Number of pages Google finds containing the phrase “Copyleft”: 176,000
Number of pages Google finds containing the phrase “GNU/Linux”: 446,000
Number of pages Google finds containing the word “Linux”: 26,500,000
Linux shipments as a percentage of all server shipments in Q3 2000, according to Gartner: 9
Linux as a percentage of the total server market, according to IDC: 27
Percentage of respondents who say they are already using Linux, according to AllNetResearch: 39
Percent IBM Linux revenue growth: 128
Percent revenue increase for Linux shipments from 1999-2000: 28
Projected Linux server installed base in 2005: 21,006,000
1: Wired News
2-4: TIME Magazine
5-7: Martin Cooper, CEO, ArrayComm and inventor of the mobile phone
8: CIA World Factbook
10-18: Google, June 11, 2001
19: Gartner Group
20: International Data Corp.
23-24: International Data Corp.
## _A_Lug's_Life_ - (c)Dave Edwards <email@example.com> 2001 _Minutes of the General Meeting of FOOLUG (Formerly the Oxbridge and Orford Linux Users Group), Aug. 2 2001_ Convened and brought to order at 7:05PM by Joseph Liebe, meeting coordinator, in room 110 Brandt College. Present: Joseph Liebe, meeting coordinator the board of directors-- George H. Walker, President Ravi Singh, Vice-President Christina Howe, Treasurer Rick Joiner, Secretary and 43 members. 1. o _Linux Can Conquer Cancer_ (LC3) presentation by Mike Kelly, followed by Q&A = 40 m. 2. o _Introduction to XFree86 and X11R6, Part XIV_ by Ewen = 3 m. 3. o General open Q&A = 20m Motion Raised: o by Alf Tupper o that the 3 Tux plush dolls received by FOOLUG from Eazel(r) (with the "Eazel(r) Forever" logo on their chests) with the sample CDROMs be distributed as prizes to the top finishers of FOOLUG's Code Wars 2001. o seconded by John Combe, top finisher in FOOLUG's Code Wars. o put to show of hands o carried o Christina inquired re the whereabouts of the Eazel(r) Tuxes o minutes of March meeting of FOOLUG board of directors consulted o "Eazel(r) Tuxes entrusted to Christina" o # find / -name 'Eazel(r) Tuxes' Meeting adjourned @ 8:30PM 20-odd members adjourned to local for FOOLUG Beerswill * * * * * * * * * * * * * * * * * * * * * * * * * * * Re: Tux took a hike Date: Mon. 11 June 2001 19:48:03 -0400 (EDT) From: Mal Tremblenc <firstname.lastname@example.org> To: email@example.com Reply to: firstname.lastname@example.org On 07-June-2001 Christina Howe wrote: <snip> > the Tuxes must have been swiped somewhere between > the end of the March meeting and the end of the > beerswill, I can't remember. Yah, I believe that. ;) > But I want them back. They're practically > collectors items—like the Spruce Goose or > something like that. So whoever took them, please Only penguins, and smaller, and not as sprucey. > return them. I've arranged with the staff at > Brandt College for the reception people to accept a > package an hour before the July meeting, no > questions asked. That's fair, isn't it? > Give someone else a chance at them. Not > *everything's* free, you know. Most directly, > the thing you do is theft. <snip> Hmmm. That rings a bell. Anyway, do like the lady says. I want mine. Mal. -- It is always easier to ask forgiveness than it is to get permission. ++--++--++--++ Re: Tux took a hike Date: Mon. 11 June 2001 19:51:34 (EDT) From: Justin E. Cohen <email@example.com> To: firstname.lastname@example.org Reply to: email@example.com On 07-June-2001 Mal Tremblenc <firstname.lastname@example.org> wrote: 8< > > Not *everything's* free, you know. Most > > directly, the thing you do is theft. > <snip> > Hmmm. That rings a bell. Anyway, do like the lady > says. I want mine. Me too. Justin. ++--++--++--++ _________________________________ This new name was chosen by majority rule at the meeting of May 3, 2001, after the townships of Oxbridge and Orford were merged into the new Municipality of Orbridge, as a compromise in order to please both sides of a divisive flame-war.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Humble Hacker?
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- Varnish Software's Hitch
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide