Open Source Ham – Is that like free range chicken?
If you have not stopped by the #linuxjournal IRC channel yet, I would encourage you to do so. You never know who you will meet or what sort of new ideas will germinate.
For example: the other day, while having !coffee and a danish, I was chatting with our fearless Editor-in-Geek, Carlie, and she was commenting that someone had left the radio on. No, not that radio, the Amateur Radio. This got my attention as I was not aware Carlie had her ticket (she does not - I am working on her - browbeating is the term my XYL uses, but I digress). As many of you know, I too am an Amateur Radio operator - a ham. [I should note that personally, I don't like the term...it does not mean anything, but it is what most folks know us as so...]. And we started chatting.
The history of Open Source software, especially Linux and Amateur Radio, is well integrated. There are as many hackers in the Amateur Radio hobby as there are in Open Source. In fact you could call Amateur Radio the original Open Source project. A number of modern developments in Information Technology, from the radio (d'uh) to the network card can trace their way back to some home brew radio operators working in their basement. The Linux kernel has long supported the AX.25 protocol (a bastard version of X.25 used in early packet transfers via radio) and several popular programs have Open Source analogs. One of the most recent developments in Amateur Radio, the D-Star digital protocol, is a fully Open Source project and is the first in recent memory where a corporation has developed a radio system utilizing the Open Source model.
As Carlie and I were talking, we wondered if there were enough interest in the communities for articles in the Linux Journal about the projects being done in Amateur Radio. Now before you get all spun up, we are not talking about killing off the Paranoid Penguin or converting the wine cellar into a ham shack, but as Dave Phillips has tapped the world of Linux and musicians and music engineers with the occasional article, we think there is interest in the readership for the occasional Amateur article.
Now is your chance. What sort of cool project are you using in your ham shack? Based on an email I sent to the ARRL PIO reflector, there are a lot of projects out there that we could highlight, everything from making it easier for Section Managers to update their web sites to unique ways to inject messages to the radio network via web interfaces to simple radio control software and logging software.
So are you an Open Source Ham? Because, When all else fails…
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide