Book Review: Tuning and Customizing a Linux System
The most specific and technical parts of the book are slightly outdated (the Red Hat version analyzed is 7.3), as almost always happens. Furthermore, most software-related books include many screenshots, lines of code or both, but Tuning and Customizing a Linux System is an exception. With the exception of the firewall case, there are almost no pictures (even in the desktop multimedia chapter!), and code and command lines are rare. Mainly, the book is page after page of simple text.
This is not necessarily bad. Remember that the purpose of the book is to teach general criteria for customizing and managing GNU/Linux systems, not to give programming advice or all the tricks of a specific distribution. In this sense, taking the time to discuss at length the principles behind the implementations, rather than explaining each script line by line, is a plus and doesn't become obsolete as fast. For the same reason, Parts Two and Three are the most valid and interesting. Perhaps the only defect is the content is a bit repetitious. The author is very competent, however, and it shows everywhere in the text.
Marco Fioretti is a hardware systems engineer interested in free software both as an EDA platform and (as the current leader of the RULE Project) as an efficient desktop. Marco lives with his family in Rome, Italy.
Articles about Digital Rights and more at http://stop.zona-m.net CV, talks and bio at http://mfioretti.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide