Linux 2.6: Can You Break It?
As this issue goes to the printer, kernel development is in feature-freeze. Pretty soon comes the fun part—testing. Almost as important as the work the kernel developers do is the work the kernel testers do. And you don't have to be a kernel expert to test the pre-2.6 kernels on your hardware or your application. By the time you read this, your favorite Linux news sites and mailing lists already might be getting “Please test” messages. Watch your favorite Linux sites, including www.linuxjournal.com, for news about the kernel testing process and how you can help.
Can Linux do for music what it did for server applications? Ask Dave Phillips. His linux-sound.org web site is a resource for everything from hard-disk recorders to music notation editors. This month, he's written a massive roundup of softsynths, software that uses a bewildering array of techniques to turn your Linux box into a synthesizer studio. Plug in a MIDI keyboard or run a sequencer, and follow along on page 80.
If you practice, soon you'll be listening to music you made, and it will sound better than CDs you buy from the major labels. Why? Rip Rowan explained it best on prorec.com:
Record labels have never really understood what makes a record sound good and frankly, few even care....For some reason, record labels have it in their heads that LOUD equals good, and therefore, LOUDER equals better. Not caring to understand even the basics of audio, these morons simply demand more volume (typically from the mastering engineer) and really don't understand or care about the consequences of their demands.
So using the audio excellence of Linux to rip major-label CDs is as pointless as burning copies of Xenix or SCO OpenServer. Record your own stuff. Freedom-loving hackers have reinvented the way we get operating systems and made them better. Now you can be the one to reinvent the way people get music, and make music better.
Two of the biggest advantages of 2.6 are going to be the included ALSA sound drivers and some dramatic improvements in latency that will make out-of-the-box distributions suitable for studio-quality audio. Preemptible kernel hacker Robert Love covers these and more on page 52.
If your need for raw software speed is greater than your attachment to little features like hardware memory protection, or if your embedded application is so important that if it goes down the machine might as well have crashed, you're the kind of person who might want to try Kernel Mode Linux. Toshiyuki Maeda explains how to make any application into a part of the kernel on page 62.
Hans Reiser follows up with more on the Reiser4 filesystem, one of several that are new for 2.6, on page 68. And, you might notice a few changes when you configure and build the new kernel. Greg Kroah-Hartman fills us in on what to expect on page 62.
Free software will always be an excellent choice for security and network applications, and a good example is the beginning of Mick Bauer's tutorial on Firewall Builder on page 30. The kernel is only a beginning. Freedom works. Use it.
Don Marti is editor in chief of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- A Memory-Efficient Doubly Linked List
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- New Container Image Standard Promises More Portable Apps
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide