Linux Journal Contents #150, October 2006
Call MisterHouse to Regulate Your Heat
by David Lynch
One-Wire interfaces and MisterHouse come to the rescue for allergies.
Do-It-Yourself Robots with Linux
by Michael Surran
Robotics made easy—especially if you get free sonar detectors.
Building a Digital Lifestyle with Open-Source Technology
by Mike Diehl
Proof positive that nerds have all the cool toys.
Manage Your Photos with F-Spot
by Daniel Bartholomew
Get a taste of the power of Mono in this photo management tool.
Advanced Video Coding on Linux
by Dave Berton
How do you make high-quality low-bitrate digital video?
Chapter 10: Personalizing Ubuntu: Getting Everything Just Right
by Keir Thomas
Whoever thinks you can't personalize a GNOME desktop needs to think again.
Digital Photography and Linux
by Adrian Klaver
Whether you're Kooka or SANE, these digital photography tools could be for you.
Reuven M. Lerner's At the Forge
Marcel Gagné's Cooking with Linux
Your Media: Out of the Kitchen, and into Every Other Place
Dave Taylor's Work the Shell
Analyzing Log Files
Jon “Maddog” Hall's Beachhead
What's in a Name?
Doc Searls' Linux for Suits
Breaking the Matrix
Nicholas Petreley's /var/opinion
MythTV Goes Amiss
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide