From the Editor - Tools, Tips and Tech for Your Next Project
Wouldn't things be different if you were in charge? Whether you want to archive your favorite TV shows on DVD, add an extra security check for device drivers without leaking information to marketing people or simply port Linux to your new 64-processor server, you'd do things better if you ran the place.
I've got news for you. You do run the place. You're the CEO of a multinational technology empire that has a cooperative research and development program with governments, companies and universities around the world, even your friend's hot new startup.
If you don't believe me, look at the COPYING and LICENSE files already on your hard drive. Whether you're working for yourself, starting a company or even toiling at a big company, you are free to partake in and build on the greatest information technology research effort ever. And unlike big slow “shared source” deals, you don't need to call a lawyer to plug in and start building.
There's no better proof of that than Christian A. Herzog's article on page 30. Want a personal video recorder that will let you make a backup? As long as the major electronics vendors design their products for cable company lawyers, you'll make the TV viewers in your family happier than the vendors ever will.
While you're watching TV, your hard drives are silently, or maybe not so silently, spinning themselves to death. With Bruce Allen's article on page 74, you can get an early warning and replace a drive on your schedule, not in the middle of the night when it fails on its own.
In this special kernel issue, you'll learn that cache isn't merely a processor spec to brag about. It's a complex resource you can either use well or “blow the cache” and go as slow as main memory. Find out how Linux uses cache in James Bottomley's article on page 58.
There's plenty of other kernel innovation in this issue too. Check out Greg Kroah-Hartman's implementation of cryptographically signed kernel modules on page 48. And Paul E. McKenney is back, this time with Dipankar Sarma and Maneesh Soni, to explain a big performance win for SMP servers on page 38.
Lisa Corsetti wanted a way to check whether the Ethernet cable is plugged in. The answer opened the door to the mysteries of ioctls, and it's all explained on page 54.
Every issue, Marcel Gagné explores some new area of software for Linux, and this time he's creating simulated structures from molecules to bridges. Can you build something that will stand up? Or how many links do you need to cut to make it fall? Find out on page 18.
Don Marti is editor in chief of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Humble Hacker?
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- Varnish Software's Hitch
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide