I think it's about time for LJ to cover companies that claim to support Linux with their products, but fail to deliver. InterVideo (www.intervideo.com) claims to have ported their windvd player to Linux, but their web site keeps telling us this:
LinDVD, InterVideo's Linux software DVD player, is currently available only to manufacturers for evaluation and integration. Linux users should be aware that we are engaged with top computer, Internet appliance, and set-top box manufacturers to provide the highest quality DVD playback for their devices.
Cyberlink claims to have ported PowerDVD. Status: same as above.
Bioware keeps telling paying Neverwinter Nights customers that the Linux client will come, but every week the reason why it doesn't come yet is a different one. Last week, the coders were on vacation; this week we can't get status updates because “the PR people will all be at Gen Con.”
Congratulations on your 100th issue! Linux Journal has been for years one of the critically important elements in the value-net that surrounds the Linux development community and is one of the reasons why Linux has become the fastest-growing operating system for platforms ranging from wristwatches to supercomputers. I'm looking forward to the next 100 issues. Keep up the good work!
—Daniel Frye, IBM Linux Technology Center
Thank you for all the calendars! I am extremely impressed with what you have managed to put together from my renderings and proud to hand the calendars out to my friends. I have already been contacted by an American company who had found my web site via the calendar, and they offered me a gig!
Loved the article on the Ultimate Linux Box [LJ, September 2002]. Just one complaint—no prices anywhere. It would have been great to see what you paid, even if that was super-secret pricing.
PC component prices in effect when we write something are usually insanely high by the time you get your LJ. Anybody got a model for predicting them?
I'm glad to see issue 100 out. LJ has been a great source of inspiration to many of us all along. You'll keep my subscription for as long as you don't replace the true Linux/Open Source spirit with advertising from Microsoft and, to add insult to injury, come up with some cynical “justification”.
You used 8 Maxtor drives in the “Ultimate Linux Box” [LJ, September 2002] to get 1TB of storage. Now, if these are 120GB drives, 8 of them adds up to almost 1TB, but not if you use RAID-5, because you need to use at least one disk for parity partition, so you are down to 7.
We used 160GB drives and should have said so in the article.
“How a Poor Contract Sunk an Open-Source Deal” [LJ, August 2002] is simply wrong. It should be “Sank”, of course.
—Jacob E. Goodman
There is another system for checking for memory overruns and leaks that was not mentioned in Cal Erickson's “Memory Leak Detection in Embedded Systems” [LJ, September 2002]. The bounds checking patches for GCC can check local and static variables in C modules, which makes it much more powerful than a malloc debug library. Check the GCC Extensions page at gcc.gnu.org/extensions.html.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide