Linux Journal Contents #112, August 2003
Implementing Encrypted Home Directories
by Mike Petullo
Keep your files safely encrypted when you're logged out, and automatically get access when you log in.
Take Control of TCPA
by David Safford, Jeff Kravitz and Leendert van Doorn
The free code behind IBM's new security chip. Menace or protector?
The Power of the Incredible Hulk—The ILM Linux Death Star
by Robin Rowe
This fully operational battle station is a 750-node Linux cluster running a custom batch scheduling program.
Root for All on the SE Linux Play Machine
by Russell Coker
Set visitors loose as root and see what they break—can SE Linux alone keep the system safe?
Eleven SSH Tricks
by Daniel R. Allen
You know it's the secure way to connect to your server. But OpenSSH is fast and convenient too.
by Ryan Breen
Need to make a secure connection from home? Set up a simple virtual private network?
2003 Editors' Choice Awards
With all the great Linux stuff introduced in the past year, these are some of the hardest decisions we've ever made.
Driving Me Nuts Device Classes
by Greg Kroah-Hartman
Kernel Korner NSA Security Enhanced Linux
by Faye Coker
At the Forge CMF Types
by Reuven M. Lerner
Cooking with Linux Illuminating Your Network's Darkest Corners
by Marcel Gagné
Paranoid Penguin Authenticate with LDAP
by Mick Bauer
Red Hat 9
by Marco Fioretti
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- Open-Source Project Secretly Funded by CIA
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The Humble Hacker?
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide