On the Web - Creating Your Own Security
Although it may be tempting to blame faulty software, incomplete patches or inadequate monitoring when security is breached on the Internet, a network or a personal computer, we must remember the part we ourselves play in computer security.
Internet security is the focus of this month's issue; back in the April 2004 issue, we looked at application and intranet security. More articles discussing these and other aspects of security can be found on the Linux Journal Web site. For an overview of how Linux and open-source software are meeting the security requirements of government agencies, read “Open Source Innovation within the DoD” (www.linuxjournal.com/article/7644) and “GNU/Linux Clears Procurement Hurdles” (www.linuxjournal.com/article/7678). Both articles are part of Tom Adelstein's Web column, Linux in Government. Keeping track of government's standing on Linux and open source is important, especially considering the warning issued this past summer by one government agency—the United States Computer Emergency Readiness Team—“advising people to use a different Web browser”.
If you are looking to enhance security on your home or small office network, putting a firewall in place is a good start. But, you knew that and you probably already have one. How about something a little more interesting—something that could turn into a nice little DIY project? In “Building a Diskless 2.6 Firewall” (www.linuxjournal.com/article/7383), author Christian Herzog explains how you can salvage some minimal hardware, replace the hard drive with a CompactFlash (CF) card and employ BusyBox to build a machine with an “iptables firewall, SSH dæmon, DHCP server and DNS server”. Christian's tutorial walks you through choosing the right software, selecting the best filesystem for the CF card, compiling the 2.6 kernel, filling the filesystem and booting with GRUB.
We all know that one important component of computer security is being prepared and able to recover when something goes wrong, as it always does on some level. A large part of one's ability to recover depends on the quality of the data backups, yet backups don't always rank high on people's to-do list. In fact, Phil Moses, author of “Open-Source Backups Using Amanda” (www.linuxjournal.com/article/7422), notes, “Data probably is the most important element in computing, but in too many cases I see data backups overlooked or approached in such a carefree manner that I shiver.” To this end, Phil focuses his article on Amanda, explaining how its ability to take on multiple configurations and multiple backup tape devices, “while requiring a minimum amount of time and resources” makes it an ideal backup solution.
Finally, for something a little different, check out Marco Tabini's article “PHP as a General-Purpose Language” (www.linuxjournal.com/article/6627). Using a PHP-based news aggregator script as an example, Marco demonstrates how the command-line version of PHP can “perform complex shell operations, such as manipulating data files, reading and parsing remote XML documents and scheduling important tasks through cron.”
Have you found a better way to monitor the traffic coming in and going out of your network? Discover a new use for your old 386? Send me an article proposal at firstname.lastname@example.org.
Heather Mead is senior editor of Linux Journal.
|Speed Up Your Web Site with Varnish||Jun 19, 2013|
|Non-Linux FOSS: libnotify, OS X Style||Jun 18, 2013|
|Containers—Not Virtual Machines—Are the Future Cloud||Jun 17, 2013|
|Lock-Free Multi-Producer Multi-Consumer Queue on Ring Buffer||Jun 12, 2013|
|Weechat, Irssi's Little Brother||Jun 11, 2013|
|One Tail Just Isn't Enough||Jun 07, 2013|
- Speed Up Your Web Site with Varnish
- Containers—Not Virtual Machines—Are the Future Cloud
- Linux Systems Administrator
- Lock-Free Multi-Producer Multi-Consumer Queue on Ring Buffer
- Non-Linux FOSS: libnotify, OS X Style
- Senior Perl Developer
- Technical Support Rep
- UX Designer
- Android's Limits
- Reply to comment | Linux Journal
1 hour 33 min ago
- Yeah, user namespaces are
2 hours 49 min ago
- Cari Uang
6 hours 20 min ago
- user namespaces
9 hours 14 min ago
9 hours 40 min ago
- One advantage with VMs
12 hours 8 min ago
- about info
12 hours 41 min ago
12 hours 42 min ago
12 hours 43 min ago
12 hours 45 min ago
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?