Linux Journal Contents #103, November 2002
Bridging the Digital Divide in South Africa
by Linda Martindale
When you have to localize both Mozilla and OpenOffice, do you have to teach your translators two sets of tools? No—just use KDE's KBabel.
Radio E-Mail in West Africa
by Wayne Marshall
To the users, it looks like regular e-mail. But behind the scenes, a Linux-based project is using HF radio to move it hundreds of kilometers without a wire or even a repeater.
Introduction to Internationalization Programming
by Olexiy Ye Tykhomyrov
When your software gets new users who prefer a different language, what are you going to do? Learn the fundamentals of POSIX locales and GNU gettext now, so that you can make your program multilingual later.
Indian Language Solutions for GNU/Linux
by Frederick Noronha
Some of the hardest languages to support are also some of the most widely spoken. Here's an overview of the projects to make Linux work with the two languages on our cover and more.
Playing with ptrace, Part I
by Pradeep Padala
You might have used strace to see what system calls a program makes. strace strace and you'll see it uses the ptrace call. What's that? Here's what.
QUORUM: Prepaid Internet at the University of Zululand
by Soren Aalto
When net access is expensive, you can't let web surfing break the budget. Here's a system to enforce fair quotas for all.
2002 Readers' Choice Awards
by Heather Mead
If you're our average reader, the GIMP is your favorite grapics program. But some of the other winners are surprising.
Using the Kernel Security Module Interface
by Greg Kroah-Hartman
Some of today's hottest security projects are using the 2.5 kernel's LSM technology. Kernel hacker Greg Kroah-Hartman explains the new security framework that will give you an extra layer of protection in the future.
Controlling Creatures with Linux
by Steve Rosenbluth, Michael Babcock and David Barrington Holt
Is that movie character animatronic or computer-generated? Find out how the same Linux-based system can let one person control either one.
Kernel Korner Multicast Routing Code in the Linux Kernel
by Matteo Pelati
At the Forge OpenACS Packages
by Reuven M. Lerner
Cooking with Linux Serving Up the All-Linux Office
by Marcel Gagné
Focus on Software
Hey USA, Don't Miss the Boat!
by David A. Bandel
Why We Still Oppose the UCITA
by Lawrence Rosen
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide