Linux Journal Contents #130, February 2005
Feb 01, 2005 By Staff
A Temporary Internet Lounge
by Colin McGregor
The Knoppix live CD became the basis of a quick and easy Internet room for a high-traffic, low-budget event.
Diskless Linux X Terminals
by Chip Coldwell
Ready for the ultimate in managed desktops without all-new hardware? Make diskless PCs work the thin client way.
Get on the D-BUS
by Robert Love
New desktop apps need to be aware of each other, changes in files and even when the phone rings.
OpenOffice.org in the Limelight
by Cezary M. Kruk
Here's how one magazine deals with deadlines, compatibility and work flow using the popular free office suite.
KDE Kiosk Mode
by Caleb Tennis
Some desktop options are good for users to customize. Others, well, here's a plan that will make support calls go a little more smoothly.
Centralized Authentication with Kerberos 5, Part I
by Alf Wachsmann
The road to single sign-on begins with a robust authentication server. This series gives you a recipe for rolling out the well-tested Kerberos suite.
Filesystem Indexing with libferris
by Ben Martin
Throw out that legacy vendor road map—full-text indexes of all file formats can be a reality today.
Gentoo for All the Unusual Reasons
by Andrew Cowie
This distribution's simple packaging and build system gives it an edge when running a mix of packaged and locally customized software.
The Compiler as Attack Vector
by David Maynor
How can an attacker build a compromised executable from pristine source code? Very carefully. Here's proof the threat is real.
Developing for the Atmel AVR Microcontroller on Linux
by Pat Deegan
Make your microcontroller projects go smoothly with familiar, powerful GNU tools.
Why and How to Use Netlink Socket
by Kevin Kaichuan He
Cooking with Linux
by Marcel Gagné
Linux VPN Technologies
by Mick Bauer
by Don Marti
Behind the Scenes at NASA's New Linux Site
Dive Into Python
by Mike Orr
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- Using tshark to Watch and Inspect Network Traffic
- The True Internet of Things
- September 2015 Issue of Linux Journal: HOW-TOs
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- Firefox Security Exploit Targets Linux Users and Web Developers
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag