I Want You To Win! -- UPDATE: CONTEST NOW OVER
UPDATE #2: The contest is now over. Thanks to everyone for participating. We'll be notifying winners early the week of March 16th. (BTW, the answer was "Kernel Panic")
UPDATE: Now with hot clue action! (See the bottom of this post)
No really, I do. I want everyone to have a subscription to Linux Journal. Well, you can get a year subscription to the digital version absolutely free. FREE. No strings attached. All you have to do is solve a puzzle and fill out a form. And puzzles are fun, so it's like 2 gifts in one. :)
You have to watch videos to find the clues, but they're short videos, so it shouldn't be too painful. Here I'll even give you links to each video. See, now it's like three gifts in one. I just give and give and give...
The contest is for TODAY ONLY!!!! So don't delay, or it's like getting zero gifts. ;)
CLUE 1: The letters unscramble to form 2 separate words, which once unscrambled are clearly Linux related. If you still can't unscramble them, come back this evening around 10PM EDT, and I'll give you one last clue. The 10PM clue will make it super easy. (I TOLD you I wanted everyone to have a subscription!)
CLUE 2: Ok, 2 hours to go before it's over. Don't panic or anything. Let's take the scientific approach that others in the comment thread have taken. I'm fairly certain there are online tools for making anagrams, etc. If a person were to put the collected letters into such a beast -- they'd be certain to generate the 2 words that are very Linux related.
(And if you can't figure it out? Guess!!! Who knows what might happen. :)
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide