Top 25 LinuxJournal.com Articles of All Time, Part 2
This week we take a look at the all-time favorite articles ever featured on LinuxJournal.com. We'll feature the top 25 in this series, presenting you with five each day this week. These 25 articles alone represent tens of millions of page views on LinuxJournal.com.
Top Articles 16 - 20
20. AVI Movie Players and Capture by Robin Rowe
Robin continues to test video and audio players for Linux.
Last we tried some MPEG players, including aKtion, gmpeg, gxanim, MPlayer, plaympeg, XAnim, xine and Xtheater. We also looked at the Be operating system in order to compare its video capabilities with Linux. Read more.
19. Compiling Java with GCJ by Per Bothner
Although Java isn't a popular choice for free projects, GJC can make it a viable option.
Java has not become as pervasive as the original hype suggested, but it is a popular language, used a lot for in-house and server-side development and other applications. Java has less mind-share in the free software world, although many projects are now using it. Examples of free projects using Java include Jakarta from the Apache Foundation (jakarta.apache.org), various XML tools from W3C (www.w3.org) and Freenet (freenet.sourceforge.net). See also the FSF's Java page (www.gnu.org/software/java). Read more.
18. sendmail: Introduction and Configuration by Eric Jorn Seneca
A guide for those of you configuring your first e-mail server.
With the growth of the Internet, e-mail has quickly become the main vehicle to spread information through the public at large. As the demand for fast, cheap and reliable e-mail grows, more individuals are turning to Linux to provide a fast, cheap and reliable solution. Read more.
17. Deploying the Squid proxy server on Linux by Ian Spare
Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate proxy server.
To provide Internet access for users in the SAS Institute Europe, Middle East and Africa (EMEA), a number of proxy servers have been installed both at the country office level and centrally at SAS European Headquarters in Heidelberg, Germany. Read more.
16. Linux and Scooby-Doo by Robin Rowe
One more on the ever-growing list of animated films using Linux opened this past weekend.
Scooby-Doo, the computer-generated dog in the Warner Brothers film of the same name, was created using Linux. Scooby-Doo was released on June 14, 2002 and stars Sarah Michelle Gellar, from the popular TV show, Buffy the Vampire Slayer. Live footage for the film was shot in Australia, and the Scooby-Doo character was added electronically later. Read more.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide