Linux Journal Contents #47, March 1998
Programming with XView
by Michael Hall
This article gives you a high-level introduction to programming with XView, a GUI toolkit that complements the OpenLook interface.
by George Kraft IV
The programming infrastructure, no its productivity tools, is a major strength of the Common Desktop Environment. This article discusses the APIs and desktop services that are benefitting developers and independent software vendors.
by Guylhem Aznar
Mr. Aznar tells us all about the developers' plans for a friendly window manager called AfterStep.
by John Blair
Don't want to give up your Macintosh or Window desktop for Linux—with TkDesk you don't have to.
An Introduction to the GIMP Tool Kit
by Otto Hammersmith
The purpose of this article is to give a short overview of what gtk+ is, what it can do and where to gather more information.
News & Articles
Linux Network Programming, Part 2: Creating Daemon Processes
by Ivan Griffin and John Nelson
In part 2 of our series we learn how to design and code network daemons to serve our clients well.
The SANE Scanner Interface
by David Mosberger
SANE makes it easy to support a wide variety of devices and of applications with a minimum amount of programming effort.
GPIB: Cool, It Works With Linux!
by Timotej Ecimovic
GPIB is a standard bus used in laboratory and industry data acquisition and experimental control that is now available for Linux.
Getting Rid of Spam
by Brandon M. Browning
qvplay and the Casio QV-10 Camera
by Bob Hepple
Linux software to control the Casio AV-10 camera is now available. Mr. Hepple tells us how to use qvplay.
by Timotej Ecimovic
Accelerated X Laptop Display Server v4.1
by Michael Scott Shappe
SGML CD: A Complete SGML Toolkit
by Terry Dawson
ISDN and Linux—Surfing at Warp Speed
by Mark Buckaway
This article presents a detailed tutorial on setting up an ISDN link to the Internet with Linux.
Letters to the Editor
Stop the Presses
Linus Wins the Nokia Award
by Phil Hughes
Take Command Ghostscript
by Robert A. Kiesling
Ghostscript Need to preview and print PostScript Files? Here's a utility that will do just that.
Linux Means Business Colleges Using Linux
by Don Kuenz
Colleges Using Linux Here are the details of how Casper College uses Linux in an academic setting.
System Administration Automated Mail Purging for SMTP Mail
by Michael S. Keller
Automated Mail Purging for SMTP Mail Mr. Keller gives us three scripts for cleaning out old mail files automatically.
Networking with the Printer Port
by Alessandro Rubini
Linux Gazette Writing HTML with m4
by Bob Hepple
Writing HTML with m4 Ease your creation and maintenance of web pages using this handy pre-processor called m4.
Best of Technical Support
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Tips for Optimizing Linux Memory Usage
- Mailman, the GNU Mailing List Manager
- Learning to Program the Arduino
- New Products
- Devuan Beta Release
- Chapter 4: Nagios Basics
- Swap Your Laptop for an iPad + Linode
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide