Linux Journal Contents #130, February 2005
A Temporary Internet Lounge
by Colin McGregor
The Knoppix live CD became the basis of a quick and easy Internet room for a high-traffic, low-budget event.
Diskless Linux X Terminals
by Chip Coldwell
Ready for the ultimate in managed desktops without all-new hardware? Make diskless PCs work the thin client way.
Get on the D-BUS
by Robert Love
New desktop apps need to be aware of each other, changes in files and even when the phone rings.
OpenOffice.org in the Limelight
by Cezary M. Kruk
Here's how one magazine deals with deadlines, compatibility and work flow using the popular free office suite.
KDE Kiosk Mode
by Caleb Tennis
Some desktop options are good for users to customize. Others, well, here's a plan that will make support calls go a little more smoothly.
Centralized Authentication with Kerberos 5, Part I
by Alf Wachsmann
The road to single sign-on begins with a robust authentication server. This series gives you a recipe for rolling out the well-tested Kerberos suite.
Filesystem Indexing with libferris
by Ben Martin
Throw out that legacy vendor road map—full-text indexes of all file formats can be a reality today.
Gentoo for All the Unusual Reasons
by Andrew Cowie
This distribution's simple packaging and build system gives it an edge when running a mix of packaged and locally customized software.
The Compiler as Attack Vector
by David Maynor
How can an attacker build a compromised executable from pristine source code? Very carefully. Here's proof the threat is real.
Developing for the Atmel AVR Microcontroller on Linux
by Pat Deegan
Make your microcontroller projects go smoothly with familiar, powerful GNU tools.
Why and How to Use Netlink Socket
by Kevin Kaichuan He
Cooking with Linux
by Marcel Gagné
Linux VPN Technologies
by Mick Bauer
by Don Marti
Behind the Scenes at NASA's New Linux Site
Dive Into Python
by Mike Orr
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide