Linux Journal Contents #117, January 2004
Controlling Hardware with ioctls
by Lisa Corsetti
Control all the little stuff that isn't in the UNIX programming books.
by James Bottomley
Use the cache right, and your code runs fast.
Scaling dcache with RCU
by Paul E. McKenney, Dipankar Sarma and Maneesh Soni
As the number of processors grow, Linux either can hit a performance wall or explore new algorithms.
Signed Kernel Modules
by Greg Kroah-Hartman
Crypto techniques give device drivers a new security check.
Testing Applications with Xnee
by Henrik Sandklef
Give your GUI apps a scriptable test suite with simulated X clicks and input.
Linux, Talon and Astronomy
by Tony Steidler-Dennison
The software that controls research-grade telescopes can control your telescope too.
Controlling Devices with Relays
by Jason Ellison
Your software can break free of the box and control lights, bells and motors in the real world.
Intermediate Emacs Hacking
by Charles Curley
You don't have to be a LISP hacker to customize Emacs.
Monitoring Hard Disks with SMART
by Bruce Allen
Keep an eye on your drives' health with an easy-to-configure tool.
Linux in Air Traffic Control
by Tom Brusehaver
Using Linux as a testing platform for mission-critical software.
Personal Video Recorder Basics
by Christian A. Herzog
Create a custom PVR that works your way and even burns archive copies.
At the Forge Publishing with Bricolage
by Reuven M. Lerner
Cooking with Linux Scalability: from Simplicity Comes Complexity
by Marcel Gagné
Paranoid Penguin Secure Mail with LDAP and IMAP, Part II
by Mick Bauer
IBM eServer BladeCenter
by Dana Canfield
Red Hat Linux 9 Bible
by Frank Conley
Hacking the Xbox
by Paul Barry
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide