Linux Journal Contents #177, January 2009

Linux Journal Issue #177/January 2009

It's a battle as old as time: good vs. evil. Fortunately, Linux and FOSS are on our side as we wage the battle against those who try to steal our secrets and invade our systems. Checking your system's security is best done sooner rather than later. Test the locks with our article on security verification; find out how to use PAM to help secure your systems; use MinorFS and AppArmor to implement discretionary access control; learn more about Samba security in part III of our series; use Darknet to help detect bots and secure your systems; use the Yubikey to increase your site's security; and don't forget to lock the doors, because a cold boot attack could render your security useless if somebody has physical access to your computer. But, we're not just about sowing the seeds of fear. We also show you how to use memcached in Rails, how to manage multiple servers efficiently, how to deploy applications easily with Capistrano, how to manage your videos with MythVideo, how to mix it up a bit (your audio that is), and even play a few games.

Features

Indepth

  • MinorFs  by Rob Meijer
    A set of user-space filesystems for enhanced discretionary access control.
  • Detecting Botnets  by Grzegorz Landecki
    Using Darknet to secure environments from threats in the wild.
  • MythVideo: Managing Your Videos  by Michael J. Hammel
    Too many videos in your MythTV menu? With a little planning, finding your favorite movies can be a breeze
  • Using Capistrano  by Dan Frost
    Simplify application deployment.

Columns

Review

In Every Issue

______________________

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Bull versus whatever

Anonymous's picture

This is the last place on earth where I expect to find the old cliche of good vs evil. What (rich) people don't understand is that too much good breeds evil too: we become insensitive to other humans and rather label THEM the evils. How about a more balanced and peaceful approach? I know I'm off the subject, but I think I'm in the spirit of FOSS. How about a little bit of dualism? Let the good and evil compete- that's how progress is made- by COMPETING contraries.

Laur Tobos, Lansing MI

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState