Guide to Linux Journal for PR Professionals
This document exists because we want to make sure everyone gets our best answers to common questions--not because we want you to read the FAQ instead of asking questions. If you do have questions about Linux Journal, please contact Jill Franklin, Executive Editor at <email@example.com>.
We do encourage you to read A Letter to Public Relations People by Dan Gillmor.
Please send comments on this document to Jill Franklin, Executive Editor: <firstname.lastname@example.org>.
Can I send you a press release?
Yes. Plain text, please. We don't pay attention to non-Linux operating systems, so if you represent several clients and can set up your system to mail us only the releases that apply to your Linux clients, we'd appreciate it.
Can I call you to see if you got my press release?
In general, that's not a good idea.
I see that your editorial calendar has a theme issue about an area we work with. How do we get a mention?
In general, we work with contributed articles, not staff-written articles. We encourage you to propose a contributed article.
Who's writing your upcoming feature on that editorial calendar topic?
The topics listed in the editorial calendar are general issue themes, not staff-written articles.
Will you run a contributed article from our company?
Maybe. Please see the Author's Guide for advice on good article topics and sending a query letter.
How do I get Linux Journal to review a product? How do I get a product in the New Products section?
To have a product considered for review, please send e-mail to New Products<email@example.com> with the following information:
- URL for the product page
- Dates the product will be available for review
- E-mail and phone contact information for the person at your company who is responsible for the product review
To submit a product for consideration in the New Products section, please send the product announcement to <firstname.lastname@example.org>. Please include a URL for a product photo or screen shot.
I have a great idea! I'll build my marketing campaign around a review in your publication!
We highly discourage vendors from depending on Linux Journal reviews or other editorial for their marketing plans. The date that a review runs is not as predictable as a marketing project should be, because the amount of space that we have available varies from month to month. We also work with freelancers for reviews, and we can't guarantee that we won't have to bounce a review back to the author for more work or even reject it entirely.
If you're looking to work with Linux Journal on a promotion that must happen on a certain date, the company does have a whole other department that does that kind of thing and your ad rep would be the right person to talk to.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide