Today, if you've got end-to-end encrypted mail going in and out of your company, it's probably somebody dealing drugs or sending or receiving pornography inside your company.
—Greg Olson, chairman and cofounder, Sendmail.com
The true cause of the enormous ills that now dismay so many Americans—the universal sleaze and “dumbing down”, the flood tide of corporate propaganda, the terminal insanity of United States politics—has risen not from any grand decline in the national character...but from the inevitable toxic influence of those few corporations that have monopolized our culture.
—Mark Crispin Miller
As bad as the cell phone carriers' quality of service is, the last thing they want is to lose control over their quality of service. That's why they don't understand the appeal of 802.11. You can't do anything viral in their environment.
If you operate a web site and wish to link to this site, you may link only to the home page of the site and not to any other page or subdomain of us.
—Dallas Morning News, Terms of Service (on its registration page)
A man is judged by his Values; his Values are marked by that which he will not compromise.
—G. E. Nordell
The social object of skilled investment should be to defeat the dark forces of time and ignorance, which envelop our future.
—John Maynard Keynes
“Did you really think we want those laws observed?” said Dr. Ferris. “We want them to be broken. You'd better get it straight that it's not a bunch of boy scouts you're up against....We're after power and we mean it....There's no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren't enough criminals one makes them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws. Who wants a nation of law-abiding citizens? What's there in that for anyone? But just pass the kind of laws that can neither be observed nor enforced or objectively interpreted—and you create a nation of law-breakers—and then you cash in on guilt. Now that's the system, Mr. Reardon, that's the game, and once you understand it, you'll be much easier to deal with.”
—Ayn Rand, Atlas Shrugged
Take what you want and pay for it, says God.
Decisions are made by those who show up.
The only obligation which I have a right to assume is to do at any time what I think right.
—Henry David Thoreau
The Internet is obviously a critical part of any e-business. But the Internet is only a common set of protocols for the transport of information.
And reading is only the common set of protocols for the translation of oral words into written marks. And Sybase's products are only the semi-intentional arrangement of bits.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide