Linux Journal Contents #165, January 2008
The January issue of Linux Journal focuses on the ever-important topic of security. But, before setting forth to fortify your systems, wet your whistle with Reuven Lerner's primer on the new Facebook API and Eric S. Raymond's musings on the history and future of open source. Once satiated, get your recommended dose of security protein with articles from Jeramiah Bowling on simple lessons for Linux security, Ron Aitchison on clandestine secrets of the DNS hierarchy, Regis Balzard and Dominik Gehl on PacketFence and Kyle Rankin on forensics with Autopsy and Sleuthkit. For desktop-security elixers, seek out Kyle once again and his piece on combining Tor and Knoppix for 100% anonymous Web browsing, as well as Carl Welch, whose how-to on the GPG-based Password Wallet will allow you to forget your Internet passwords. We hope you enjoy this issue and look forward to your feedback.
The Tao of Linux Security: Five Lessons for a Secure Deployment
by Jeramiah Bowling
Tighten up your systems from the start using this simple plan.
Digging Up Dirt in the DNS Hierarchy, Part I
by Ron Aitchison
Even when your DNS system is functioning normally, all may not be well below the surface.
Introduction to Forensics
by Kyle Rankin
Hit the ground running on your first forensics project with Autopsy and Sleuthkit.
by Regis Balzard and Dominik Gehl
PacketFence's extensive isolation mechanisms secure both your wired and wireless networks.
Interview with Eric Raymond
by Glyn Moody
Eric Raymond on open source.
GCC for Embedded Engineers
by Gene Sally
A look at how GCC works and how to get the most out of this marvel of modern software engineering.
GPG-Based Password Wallet
by Carl Welch
Forget your passwords.
Security in Qtopia Phones
by Lorn Potter
Open source doesn't mean insecure.
Separate the Static from the Dynamic with Tomcat and Apache
by Alan Berg
Efficiency tricks with Apache and Tomcat.
Creating VPNs with IPsec and SSL/TLS
by Rami Rosen
The two most common and current techniques for creating VPNs.
Reuven M. Lerner's At the Forge
Working with Facebook
Marcel Gagné's Cooking with Linux
Security's Front Door
Mick Bauer's Paranoid Penguin
Getting a Clue with WebGoat
Dave Taylor's Work the Shell
Numerology, or the Number 23
Kyle Rankin's Hack and /
Browse the Web without a Trace
Doc Searls' EOF
Why to Build on FOSS in the First Place
In Every Issue
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Android Browser Security--What You Haven't Been Told
- Readers' Choice Awards 2013
- Epiq Solutions' Sidekiq M.2
- The Many Paths to a Solution
- Nativ Disc
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Synopsys' Coverity
- Tech Tip: Really Simple HTTP Server with Python
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide