Linux Journal Contents #58, February 1999
COAS: A Flexible Approach to System Administration Tools
by Olaf Kirch
Caldera is working on a new easy-to-use configuration tool for Linux. Mr. Kirch gives us the details.
Csound for Linux
by David Phillips
Mr. Phillips discusses some history as well as what's happening now in the Linux Csound world.
by C. Wayne Wright and Edward J. Walsh
The authors tell us about hunting hurricane using the Scanning Radar Altimeter based on the Linux system and analyzing the data with Yorick.
University of Toronto WearComp Linux Project
by Dr. Steve Mann
Dr. Mann describes his WearComp (“Wearable Computer”) invention and how it has evolved into the same kind of philosophical basis for self determination and mastery over one's own destiny that is characteristic of the Linux operating system that currently runs on WearComp.
News & Articles
Virtual Network Computing
by Brian Harvey
Mr. Harvey tells us about virtual network computing and how to set it up to control MS Windows Application from Linux.
Configuring ATM Networks
by Wayne J. Salamon
This article describes how to configure Linux-based PCs and an asynchronous transfer mode (ATM) switch to build on ATM network.
The GNOME Project
by Miguel de Icaza
What is GNOME and where is it heading? Miguel tells us all.
KDE: The Highway Ahead
by Kalle Dalheimer
In this article, Mr. Dalheimer describes some of the plans being made for future versions of KDE.
P-Synch: Changing the Way We Change Passwords
by Tim Parker
Linux Apprentice The login Process
by Andy Vaught
System Administration Caching the Web, Part 2
by David Guerrero
This month Mr. Guerrero tells us about the definitive proxy-cache server, Squid.
At the Forge Creating a Web-based BBS, Part 2
by Reuven M. Lerner
Mr. Lerner continues to look at the bulletin board system, examining the code that works with individual messages.
Focus on Software
by David A. Bandel
Letters to the Editor
Letters to the Editor More Letters to the Editor
Guest Editorial Software Libre and Commercial Viability
by Alessandro Rubini
Software Libre and Commercial Viability Mr. Rubini gives us his opinion of the Open Source movement.
Stop the Presses
by Marjorie Richardson
Announcements by Sun and Troll Tech
Best of Technical Support
Color Reactiveness on the Desktop
by Bowie Poag
Mr. Poag describes the InSight project which is designing a desktop where color is used to inform the user of what is happening with his applications.
Building Network Management Tools with Tcl/Tk
by Syd Logan
LJ Interviews Informix's Janet Smith
by Marjorie Richardson
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide