Write for Linux Journal
We always are looking for contributed articles. Only by accepting articles from a variety of Linux users involved firsthand in the projects they write about can we do justice to the many areas in which people are applying Linux and the software that runs on it.
We mainly run tutorial articles for all levels of expertise. Someone who is an expert on Verilog may be starting out on a sound editing application, so not all introductory articles are for new users only. We always appreciate good introductions to new and useful software.
We also are looking for real world stories. If you are using Linux to do something unusual or if you are using Linux on a large scale, many people would like to read your story in Linux Journal. Our readers rely on Linux Journal to show them when Linux becomes a good choice for new kinds of projects. So, if you're the first person you know to do something on Linux, please let us know.
You do not have to be a professional writer to write for Linux Journal. If you have written informative Web pages or helped users succeed with their Linux projects by posting good answers to mailing lists, you have the basic writing skills needed to become a Linux Journal author.
Please read our author's guide, and send us e-mail if you have an idea for an article. Be sure the subject line contains descriptive words, such as "C compiler article", to help us when sorting through submissions.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide