Linux Journal Announces May 'Kernel Internals' Issue
"Once again the kernel internals issue has the bang to transfix experienced and aspiring kernel hackers alike," said Carlie Fairchild, VP of Marketing & Sales. "Readers count on Linux Journal to bring them the most reliable technical Linux content available in any publication.
"First off, LJ's editor in chief, Don Marti, and preemptible kernel hacker, Robert Love, each provide their own unique insights into kernel 2.6 - what to expect, how to best exploit it and how to get involved in improving it.
"We are also pleased to have Hans Reiser go in-depth on Reiser4, one of several innovative new file systems in kernel 2.6.
"Toshiyuki Maeda's article on Kernel Mode Linux will interest readers who need raw speed more than anything else, as well as those doing critical embedded applications. He explains how to make any application into a part of the kernel.
"Dave Phillips is on-board again this month sharing his infinite knowledge of Linux's audio capabilities. In this issue he provides a massive roundup of softsynths, software that uses a bewildering array of techniques to turn a Linux box into a truly professional synthesizer studio.
"This issue contains much more technical content, including Linux Journal's standard columns. Two of many are Reuven M. Lerner's At the Forge: a dive into Plone, the killer app that might bring Zope-based content management to the masses, and Doc Searls' Linux for Suits: an outlook for Linux's final push into mainstream corporate culture.
"Of course," concluded Fairchild, "this is just a taste of the wide range of news, articles, interviews, features and reviews that our readers will find in Linux Journal each and every month."
For more information on Linux Journal, visit the Web site at http://www.linuxjournal.com.
About Linux JournalLinux Journal is the premier Linux magazine, dedicated to serving the Linux community and promoting the use of Linux world-wide. A monthly periodical, Linux Journal is currently celebrating its ninth year of publication. Linux Journal may be purchased at all major bookstores and newsstands and may also be ordered by calling 1-888-66-LINUX, sending e-mail to firstname.lastname@example.org or visiting http://www.linuxjournal.com/. For additional information about Linux Journal send e-mail to email@example.com.
About the PublisherSSC Publications is an established leader in the Linux, Open Source and UNIX fields, publishing best-selling books, reference cards and e-zines in these fields since 1983. SSC is headquartered in Seattle, Washington and has been operating since 1968. Visit SSC on the web at http://www.ssc.com/.
Media Relations Contact:
Rebecca Cassity, Marketing ManagerSpecialized Systems Consultants, Inc. (SSC)PO Box 55549, Seattle, WA, 98155Phone: +1 206-297-8653 / Fax: +1 firstname.lastname@example.org
Rebecca Cassity is the Director of Sales for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- Canonical and BQ's Aquaris M10 Ubuntu Edition Tablet
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide