Linux Journal Contents #165, January 2008
The January issue of Linux Journal focuses on the ever-important topic of security. But, before setting forth to fortify your systems, wet your whistle with Reuven Lerner's primer on the new Facebook API and Eric S. Raymond's musings on the history and future of open source. Once satiated, get your recommended dose of security protein with articles from Jeramiah Bowling on simple lessons for Linux security, Ron Aitchison on clandestine secrets of the DNS hierarchy, Regis Balzard and Dominik Gehl on PacketFence and Kyle Rankin on forensics with Autopsy and Sleuthkit. For desktop-security elixers, seek out Kyle once again and his piece on combining Tor and Knoppix for 100% anonymous Web browsing, as well as Carl Welch, whose how-to on the GPG-based Password Wallet will allow you to forget your Internet passwords. We hope you enjoy this issue and look forward to your feedback.
The Tao of Linux Security: Five Lessons for a Secure Deployment
by Jeramiah Bowling
Tighten up your systems from the start using this simple plan.
Digging Up Dirt in the DNS Hierarchy, Part I
by Ron Aitchison
Even when your DNS system is functioning normally, all may not be well below the surface.
Introduction to Forensics
by Kyle Rankin
Hit the ground running on your first forensics project with Autopsy and Sleuthkit.
by Regis Balzard and Dominik Gehl
PacketFence's extensive isolation mechanisms secure both your wired and wireless networks.
Interview with Eric Raymond
by Glyn Moody
Eric Raymond on open source.
GCC for Embedded Engineers
by Gene Sally
A look at how GCC works and how to get the most out of this marvel of modern software engineering.
GPG-Based Password Wallet
by Carl Welch
Forget your passwords.
Security in Qtopia Phones
by Lorn Potter
Open source doesn't mean insecure.
Separate the Static from the Dynamic with Tomcat and Apache
by Alan Berg
Efficiency tricks with Apache and Tomcat.
Creating VPNs with IPsec and SSL/TLS
by Rami Rosen
The two most common and current techniques for creating VPNs.
Reuven M. Lerner's At the Forge
Working with Facebook
Marcel Gagné's Cooking with Linux
Security's Front Door
Mick Bauer's Paranoid Penguin
Getting a Clue with WebGoat
Dave Taylor's Work the Shell
Numerology, or the Number 23
Kyle Rankin's Hack and /
Browse the Web without a Trace
Doc Searls' EOF
Why to Build on FOSS in the First Place
In Every Issue
Webinar: 8 Signs You’re Beyond Cron
On Demand NOW
Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.View Now!
|Dr Hjkl on the Command Line||May 21, 2015|
|Initializing and Managing Services in Linux: Past, Present and Future||May 20, 2015|
|Goodbye, Pi. Hello, C.H.I.P.||May 18, 2015|
|Using Hiera with Puppet||May 14, 2015|
|Urgent Kernel Patch for Ubuntu||May 12, 2015|
|Gartner Dubs DivvyCloud Cool Cloud Management Vendor||May 12, 2015|
- Initializing and Managing Services in Linux: Past, Present and Future
- Dr Hjkl on the Command Line
- Goodbye, Pi. Hello, C.H.I.P.
- Using Hiera with Puppet
- Gartner Dubs DivvyCloud Cool Cloud Management Vendor
- Infinite BusyBox with systemd
- Urgent Kernel Patch for Ubuntu
- Mumblehard--Let's End Its Five-Year Reign
- It's Easier to Ask Forgiveness...
- A More Stable Future for Ubuntu