November 2005, From the Editor - dmarti:~$ logout
Since this is my last column as editor in chief, I get to give a bunch of advice, so I'll cover two great inventions that we should all take a fresh look at and come up with more things like them. First, the most important technology for the Internet isn't on the Internet. Want a hint? 12:00. 12:00. 12:00. The second most important technology has a symbol that you probably look at in a Web browser several times a day.
And I get to thank people for making the Linux Journal editor job the best job ever. Edsger Dijkstra once wrote, “Besides a mathematical inclination, an exceptionally good mastery of one's native tongue is the most vital asset of a competent programmer.” By this measure, our authors are competent programmers, some even in a non-native human language. There has been no better way for me to get my Linux questions answered than to assign articles to these informed, helpful people.
Thanks to the editorial staff too. Linux Journal is fortunate to have Jill Franklin's managerial, editorial and XMLitorial skills; Heather Mead's quiet but effective powers that bring in links like few other Linux sites; and of course Garrick Antikajian's eye for good design, even when it includes hairy-looking code. Thank you all for not selling out to the Mainstream IT Media and sticking with your fans.
The humble VCR clock is the Internet's most important technology because it saved civilization in 1984. The big movie studios wanted to create a standard for copyright infringement that would crush any new communications technology. In a scarily close decision—5 to 4—the Supreme Court allowed the VCR to exist because you can use it for time-shifting.
The principle got a thorough test in the Grokster case decided this June, and although the new “affirmative steps to foster infringement” test will surely scare the venture capitalists away from media-oriented startups, the so-called Sony principle gives you the right to continue inventing.
The lesson here is that lawmakers and courts look at the wrappers of things and their real uses, not just at principles. If an invention is great for freedom, put a big obvious “clock” on it—a way for it to prove itself to society. How about a virus checker updater that uses a new P2P system? Inventing has always been part showmanship, and the features of an invention let it speak for itself in debates about laws and norms.
If you thought in the 1980s that you would be able to participate in global communication and commerce using freely licensed software and high-grade crypto on a cheap computer, you should probably tone your optimism down a little. Our other invention to appreciate is the little “lock” in the Web browser. The Internet doesn't work for business transactions without strong crypto. Every big company that wants to run a shopping site, share documents with traveling employees or run a remote backup had to join the side of freedom in the crypto debate. When inventing something that makes big business sense, build in a dependency on freedom and enroll powerful interests on freedom's side.
This is really our best issue yet. We have a brand-new feature of the latest kernel, possibly the most productive Web tool ever, a Beowulf cluster in a toolbox, freedom-enabled tools for designing electronics projects and of course a real-time Linux pinball machine. Stay free and enjoy the issue.
Don Marti is editor in chief of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Death of RoboVM
- Server Hardening
- The Humble Hacker?
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- Varnish Software's Hitch
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide