2003 Readers' Choice Awards
The 2003 Linux Journal Readers' Choice Awards saw the addition of a few new categories, mostly hardware, and the loss of a couple old ones—thank the heavens for built-in pop-up blocking in browsers. Overall, voting was up from last year; more than 7,500 people participated in 2003's four weeks of on-line voting. The results showed a bit of a shake-up in the Favorite Distribution category, but most of last year's winners are back this year.
xmms continues to rule this category, taking the top spot for the third consecutive year. In its first year on the official list, noatun claims second place. Your new favorite write-in choice is mplayer.
Other than the Favorite Workstation category, Favorite Backup Utility seems to be the category least dependent on commercial offerings. In a repeat of last year's winners, tar, Amanda and Arkeia take the tops spots. rsync is the favorite write-in. Thankfully, fewer of you still seem to believe backups are only for wimps.
Linux in a Nutshell, 3rd Ed., Ellen Siever, et al.
Linux System Administration, Vicki Stanfield and Roderick W. Smith
Running Linux, 3rd Ed., Matt Welsh, et al.
Once again, the top three titles are the same, although Linux System Administration and Running Linux switched places this year. Many of the purists opt to rely solely on man pages. Judging by the sheer volume of write-ins and new releases that come through the LJ offices for review, the Linux book market is picking up speed.
Here, too, the top three choices are the same this year, with Konqueror and Galeon switching spots in 2003. Netscape's popularity continues to decline; 6.x received a mere 236 out of 7,362 votes in this category. Firebird is making a lot of noise as a write-in, coming in seventh place overall.
Cooking with Linux
Ah, Marcel; il est un homme savant, gentil and trés drôle. How can we not respect a man as concerned with raising our sysadmin awareness as with educating our wine palates? Many people also like Kerner Korner and its rotating author bylines—must be all the 2.6 news.
After a brief respite last year, when InterBase claimed third place, Oracle returns to the top three this year. Although MySQL retains the top spot, PostgreSQL continues to narrow the gap. Firebird, the independent database based on InterBase code, is once again the favorite write-in vote.
Monarch AMD 2000+ System Special
Los Alamos ULBx
Perhaps we should have named this new category Open-Source Junkyard Wars. Although Monarch, Los Alamos, Apple G5, Dell and a few Sun machines received votes, almost 90% of those who voted in this new category selected Homemade as their favorite workstation. Picture it: two teams of four people, $100, two days and a bin of recycled parts—just imagine what we could build.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide