Eclecticism for the Masses
Being eclectic is a good thing, even though the word often is said in a tone of voice usually reserved for words like “lice” and “spellcheck”. The Linux Journal web site, however, prides itself on being a compendium of topics related to open-source, free software and, of course, Linux. In any given week, a visitor might find articles ranging from hardware reviews to lessons in spam filtering to how-tos for building one's own VPN gateway. It may sound obvious, but a lot of people are using Linux to do a lot of different things. Our site attempts to provide articles that explain how to do what you're dying to try, as well as introduce topics and projects with which you might not be familiar. We might even be able to help you win an argument.
Say, for instance, someone is giving you the old line about Linux being too hard to use. Point them to “Interview with a Grandmother” (www.linuxjournal.com/article/6562 ), in which Joe Klemmer talks to his mom about her experience with OEone's HomeBase Linux system. Not only is it so easy the proverbial grandmother can use it, this real grandmother uses her computer “ever so much more than before”.
Back in early January 2003, senior editor and business reporter Doc Searls prognasticated Linux and open-source events for 2003 in “Which Major PC Vendor Will Sell Desktop Linux First?” (www.linuxjournal.com/article/6548). As the title indicates, Doc feels this is the year Linux on the desktop will show up in a major way, thanks to the support of some major vendors. Is he right? Also, be sure to check out the predictions and comments offered by readers at the end of the article.
Finally, it wouldn't be LJ if we did not have at least one security article. In “Security with PHP Superglobals” (www.linuxjournal.com/article/6559), David Lechnyr describes his desire to make after-the-deadline on-line reservations for ski equipment and how easy that turned out to be thanks to the site's use of GET statements. If the site had used PHP superglobals, which allow users “to specify which variables received by a specific method should be used”, it would have been more secure, but he wouldn't have had skis waiting the next morning.
Just like having a music collection with a little Ella, a little Hank, some Buzzcocks and the essential Who is a good thing, so is having a web site with a little bit of everything—I mean, you'd rather be eclectic than boring, right?
Remember to check the Linux Journal web site often; new articles are posted daily. If you want to write an article for us, drop a line to firstname.lastname@example.org.
Heather Mead is senior editor of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide