Linux Journal Contents #164, December 2007
The December issue of Linux Journal focuses on Linux-based notebooks. If you haven't yet experienced the joy of a finely tuned, preloaded Linux laptop, crack open James Gray's notebook buying guide to find yours. Once your notebook is purring like a kitten, make it snarl with this issue's wide selection of articles on maximizing its functionality. See Ben Martin's article setting up an on-line encrypted backup scheme, Federico Kereki's piece on getting wireless devices without native Linux support working with NDISwrapper and Surdas Mohit's how-to on making your notebook a triple-boot superstar.
Have an older notebook collecting dust? While Dan Sawyer argues that you should make it a multitrack recorder, Joseph Quigley says make it a server.
Had enough of notebooks for now? Turn your attention to our interview with Sean Moss-Pultz of the OpenMoko Project, whose goal is to create the world's best open mobile devices. Or, see what our world-class columnists have to say this month: Reuven Lerner connects Web apps to Facebook; Dave Taylor creates a command-line calculator app; Doc Searls observes geek-driven changes to the traditional corporation; and Marcel Gagné (who else would?) taunts you with glorious ASCII games from your childhood.
We hope you enjoy the notebook issue, and as always, we welcome your feedback.
The State of the Market: a Laptop Buying Guide
by James Gray
LJ helps you find the right Linux laptop.
On-line Encrypted Backups for Your Laptop
by Ben Martin
FUSE your laptop.
Getting Wireless the NDISwrapper Way
by Federico Kereki
The NDISwrapper for making wireless devices work on Linux.
My Triple-Boot Laptop
by Surdas Mohit
So nice, install it thrice.
Interview with Sean Moss-Pulz
by Adam M. Dutko
A glimpse into the mind of the phone liberator: Sean Moss-Pultz on the OpenMoko Project.
Portable Hard Disk Recorder How-To
by Dan Sawyer
Build a multitrack recorder on an old laptop.
Ye Old Laptop As A Server
by Joseph Quigley
Don't throw away that old laptop just yet.
Quake, Meet GPL; GPL, Meet
by Shawn Powers
What do you get when you cross Quake 3 with water balloons? A whole lot of fun!
Get Organized with Emacs Org-Mode
by Abhijeet Chavan
Is Emacs an editor or PIM?
by Daniel Bartholomew
Linux offerings from Grubby Games.
MySQL Stored Procedures: Next Big Thing or Relic of the Past?
by Guy Harrison
Do MySQL 5 Stored Procedures produce tiers of joy or sorrow?
Reuven M. Lerner's At the Forge
Marcel Gagné's Cooking with Linux
Exciting Arcade Action in Glorious ASCII
Dave Taylor's Work the Shell
Solve: a Command-Line Calculator
Doc Searls' EOF
The Power of the Individual, Modeled by Open-Source Development
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide