Android Candy: Free, Family, Fun—Fantastic
I've mentioned geocaching before, but if you've never taken the time to go out and do it, you're really missing out. Whether you're dragging your family through two feet of snow in the middle of the woods (yeah, I did that last year, I'm still not sure they've forgiven me) or following your GPS around a parking lot looking for a tiny micro-cache, geocaching is fun. You need only a few things to go geocaching:
A sense of adventure.
Friends or family (not required, but more fun).
A sharp mind (there often are brain puzzles involved).
A GPS or smartphone app to guide you.
That's where c:geo comes in. There are several geocaching apps for Android, and they vary in price from free to very not free. The c:geo app is one of the free ones, and it also happens to be one of the best. It will show you clues, help you find local geocaches and guide you on a map to the GPS location you need. Whether you're a hard-core geocacher or just want to go out for a little fun with the family, c:geo is a great tool for your Android device that will make geocaching easier and more enjoyable. You can find it in the Google Play Store.
Because it's such an incredible application, and because it relates to our three favorite F words (Free, Family, Fun), c:geo gets our Editors' Choice award this month. Download it now, and get out there and find stuff: http://www.cgeo.org.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide