Linux Journal Contents #165, January 2008
The January issue of Linux Journal focuses on the ever-important topic of security. But, before setting forth to fortify your systems, wet your whistle with Reuven Lerner's primer on the new Facebook API and Eric S. Raymond's musings on the history and future of open source. Once satiated, get your recommended dose of security protein with articles from Jeramiah Bowling on simple lessons for Linux security, Ron Aitchison on clandestine secrets of the DNS hierarchy, Regis Balzard and Dominik Gehl on PacketFence and Kyle Rankin on forensics with Autopsy and Sleuthkit. For desktop-security elixers, seek out Kyle once again and his piece on combining Tor and Knoppix for 100% anonymous Web browsing, as well as Carl Welch, whose how-to on the GPG-based Password Wallet will allow you to forget your Internet passwords. We hope you enjoy this issue and look forward to your feedback.
The Tao of Linux Security: Five Lessons for a Secure Deployment
by Jeramiah Bowling
Tighten up your systems from the start using this simple plan.
Digging Up Dirt in the DNS Hierarchy, Part I
by Ron Aitchison
Even when your DNS system is functioning normally, all may not be well below the surface.
Introduction to Forensics
by Kyle Rankin
Hit the ground running on your first forensics project with Autopsy and Sleuthkit.
by Regis Balzard and Dominik Gehl
PacketFence's extensive isolation mechanisms secure both your wired and wireless networks.
Interview with Eric Raymond
by Glyn Moody
Eric Raymond on open source.
GCC for Embedded Engineers
by Gene Sally
A look at how GCC works and how to get the most out of this marvel of modern software engineering.
GPG-Based Password Wallet
by Carl Welch
Forget your passwords.
Security in Qtopia Phones
by Lorn Potter
Open source doesn't mean insecure.
Separate the Static from the Dynamic with Tomcat and Apache
by Alan Berg
Efficiency tricks with Apache and Tomcat.
Creating VPNs with IPsec and SSL/TLS
by Rami Rosen
The two most common and current techniques for creating VPNs.
Reuven M. Lerner's At the Forge
Working with Facebook
Marcel Gagné's Cooking with Linux
Security's Front Door
Mick Bauer's Paranoid Penguin
Getting a Clue with WebGoat
Dave Taylor's Work the Shell
Numerology, or the Number 23
Kyle Rankin's Hack and /
Browse the Web without a Trace
Doc Searls' EOF
Why to Build on FOSS in the First Place
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
- Canonical and BQ's Aquaris M10 Ubuntu Edition Tablet
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide