Linux Journal Contents #126, October 2004

Linux Journal Issue #126/October 2004

Features

  • Point-to-Point Linux  by Phil Hollenback
    When this Manhattan investment company decided to mirror its critical data off-site, the IS staff built their own T3 and T1 routers. How did that work, and would they do it again?
  • SQL Comes to Nmap: Power and Convenience  by Hasnain Atique
    Port-scan your own hosts to find misconfigured and unauthorized services. Put all that data into a database, and you can keep track of thousands of systems.
  • Setting Up Virtual Security Zones in a Linux Cluster  by Makan Pourzandi and Axelle Apvrille
    When projects need to share the Linux cluster but shouldn't see each other's data, split your in-demand cluster into separate virtual ones.

Indepth

  • Introduction to Sound Programming with ALSA  by Jeff Tranter
    The 2.6 kernel brings new capabilities to the Linux sound API. We cover the essentials with a working sound recording app.
  • The Politics of Porting  by Stephen C. Forster
    Don't do this. It could get you fired. Unless your company is really shooting itself in the foot, then you've got to do what you've got to do.
  • Linux Tools for Professional Photography  by RW Hawkins
    Tweak your system to make photo colors accurate, and more. Now you won't get a nasty surprise when the photo you send to Linux Journal shows up all wrong.

Embedded

  • Porting RTOS Device Drivers to Embedded Linux  by Bill Weinberg
    Your old real-time operating system made you do a lot for yourself as a driver author. Take advantage of the facilities Linux offers and clean up some spaghetti code while you're at it.

Toolbox

Columns

Reviews

Departments

______________________

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix