Linux Journal Contents #48, April 1998
Using Linux in a Control and Robotics Lab
by Jon Davis
How a lab at Queen's University is using Linux to develop programs and control hardware experiments.
Biomedical Research and Linux
by Roger S. Flugel
Linux is readily establishing itself in the biomedical field as a powerful and reliable system for research computing.
Latvian Government Uses Linux
by Dmitrie Komarov
Mr. Komarov tells us how he used Linux to give an old database new capabilities and thereby saved his government money.
Satellite Remote Sensing of the Oceans
by Simon J. Keogh, Emmanouil Oikonomou, Daniel Ballestero and Ian Robinson
Presented here is an overview of the kind of remote sensing that is done at Southampton University and how Linux has helped improve our productivity.
Small Business Marketing of Linux
by Cliff Seruntine
Linux is a good business product. This article deals with the why, how and who of selling Linux.
News & Articles
Building Projects With Imake
by Otto Hammersmith
Here's an explanation of how Imake works and how you can use it to build your executables—an article for programmers with C and Unix programming skills.
Linux Network Programming, Part 3: CORBA: The Software Bus
by Ivan Griffin, Mark Donnelly and John Nelson
This month we are presented with an introduction to the networking of distributed objects and the use of CORBA.
Financial Calculation Programs for Linux
by James Shapiro
Mr. Shapiro shows us how to write a program to compute internal rate of return using three programming languages supported by Linux—Perl, C and Java.
LJ Interviews Mr. Eid Eid of Corel Computer
by Marjorie Richardson
Helping Netscape Make History
by Eric S. Raymond
Netscape source is now free, who would have thought it? Eric Raymond, that's who. Here are his insights into this momentous event.
Product Reviews Visual SlickEdit: A Commercial Editor for Programmers
by Larry Ayers
Product Reviews WordPerfect 7 for Linux
by Michael Scott Shappe
Product Reviews TeraSpell 97 for Emacs
by Daniel Lazenby
Book Reviews Practical Programming in Tcl and Tk
by John McLaughlin
Book Reviews Protecting Your Web Site with Firewalls
by Leam Hall
At the Forge Using What We've Learned
by Reuven M. Lerner
This month Mr. Lerner shows us how to set up a web site using many of the techniques he's taught us over the past months.
Letters to the Editor
From the Editor
by Marjorie Richardson
Stop the Presses
The Software world—It's a Changin'
by Phil Hughes
System Administration Managing your Logs with Chklogs
by Emilio Grimaldo
Managing your Logs with Chklogs An introduction to a program written by Mr. Grimaldo to manage system logs.
Kernel Korner Writing a Linux Driver
by Fernando Matia
The main goal of this article is to learn what a driver is, how to implement a driver for Linux and how to integrate it into the operating system. An article for the experienced C programmer.
Configuring procmail with The Dotfile Generator
by Jesper Pedersen
Best of Technical Support
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide