2004 Editors' Choice Awards
Did some of the members of Beatallica want to be a Beatles tribute band, while others wanted to be a Metallica tribute band? We can't go see them perform “Got to Get You Trapped Under Ice” and “Everybody's Got a Ticket to Ride Except for Me and My Lightning”, because Beatallica is in hiding for fear of record company lawyers.
It wasn't always like this. Back when Walt Disney directed Steamboat Willy, a parody of Buster Keaton's Steamboat Bill, Jr., copyright law was different and encouraged creativity, not lawyer bills. Professor Lawrence Lessig, in Free Culture, explains copyright in a way that will help you, the Linux and Internet native, explain today's copyright issues to people who are new to the whole sorry scene. Lessig represents the often-ignored middle ground in the copyright debate.
LWN wins again. We can say the same thing about this site that we said last year: a great mix of links to the best Linux stories from other sites, including Linux Journal's, plus original technical content. A recent series profiles the various free software choices in calendars, image viewers and drawing programs.
If you sold your TV when L.A. Law went off the air, this is the site for you. Get sucked in to the courtroom drama surrounding failing UNIX vendor The SCO Group, formerly Caldera, and the company's long-shot lawsuits against AutoZone, Daimler-Chrysler, IBM and Novell. Will SCO dodge a lawsuit from Red Hat? Did Novell transfer UNIX copyrights to SCO? Will Grace get back together with Victor? Greg says Groklaw is “now the home page for more IBM executives than any other site.”
Greg weighs in to support the linux-kernel mailing list: “It's high volume, oftentimes rude, but always informative and never boring. And if a user is willing to be nice, quite helpful”, he says. So be nice. Or else.
The digital audio workstation Ardour was the centerpiece of the Linux-based recording studio in Aaron Trumm's article in the May 2004 issue. In his column for the Linux Journal Web site, Dave Phillips wrote, “Ardour has become a center of attention for those of us who wish to use Linux in a professional audio setting”, and “That Ardour has come so far and evolved so well is a testament to the talents and dedication of its programming crew.” Congratulations to Paul Davis and the rest of the Ardour team.
Remember that IBM ThinkPad T41, the laptop everyone likes? Doc bought his through EmperorLinux, a company full of friendly people who set up major-brand laptops with your distribution of choice, with a patched and tested kernel that supports the laptop hardware. Emperor sells its Linux-enabled T41 as the “Toucan”, and it will set up the system with any of six different distributions or dual-boot with a Microsoft OS. Best of all, EmperorLinux is quick to reply to support calls on Linux issues and the original manufacturer's warranty remains in effect for the hardware.
Now that the T41 is a hit on the Linux scene, will IBM sell EmperorLinux an OS-less version so Linux customers don't have to pay for a legacy OS license? Maybe if they knock off reading Groklaw for a few minutes and do the deal, we'll get lucky next year.
Resources for this article: /article/7613.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide