Linux Journal Contents #112, August 2003
Implementing Encrypted Home Directories
by Mike Petullo
Keep your files safely encrypted when you're logged out, and automatically get access when you log in.
Take Control of TCPA
by David Safford, Jeff Kravitz and Leendert van Doorn
The free code behind IBM's new security chip. Menace or protector?
The Power of the Incredible Hulk—The ILM Linux Death Star
by Robin Rowe
This fully operational battle station is a 750-node Linux cluster running a custom batch scheduling program.
Root for All on the SE Linux Play Machine
by Russell Coker
Set visitors loose as root and see what they break—can SE Linux alone keep the system safe?
Eleven SSH Tricks
by Daniel R. Allen
You know it's the secure way to connect to your server. But OpenSSH is fast and convenient too.
by Ryan Breen
Need to make a secure connection from home? Set up a simple virtual private network?
2003 Editors' Choice Awards
With all the great Linux stuff introduced in the past year, these are some of the hardest decisions we've ever made.
Driving Me Nuts Device Classes
by Greg Kroah-Hartman
Kernel Korner NSA Security Enhanced Linux
by Faye Coker
At the Forge CMF Types
by Reuven M. Lerner
Cooking with Linux Illuminating Your Network's Darkest Corners
by Marcel Gagné
Paranoid Penguin Authenticate with LDAP
by Mick Bauer
Red Hat 9
by Marco Fioretti
- The Tiny Internet Project, Part I
- Machine Learning with Python
- SUSECON 2016: Where Technology Reigns Supreme
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Securing the Programmer
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide