Linux Journal Contents #60, April 1999
by Marjorie Richardson
by Marcel Gagné
A review of this networking computer from Canada.
FlowNet: An Inexpensive High-Performance Network
by Erann Gat and Mike Ciholas
A look at current state-of-the-art network hardware and protocols with a solution for the slow network problem.
Using Linux with Network Computers
by Brian Vincent
A look at one man's experiences setting up Linux as an application and boot server for Neoware network computers.
Network Administration with AWK
by Juergen Kahrs
If you are looking for an easy way to access your network services, AWK scripting provides the means.
by Scott Schad
A report on Caldera's new Linux Administration Course.
by Ben Crowder
No, it is not that thing you use to stir up food in your kitchen—it is a hot new state-of-the-art 3-D modeler.
LJ Interviews John Ousterhout
by Marjorie Richardson
LJ talks to the creator of Tcl/Tk about the port of TclPro to Linux.
Linux Certification for the Software Professional
by P. Tobin Maginnis
A discussion of the need for certification and a proposal from Sair, Inc. for a Linux certificate program.
by Charles Curley
Xi Graphics MaXimum cde/OS v1.2.3, Executive Edition
by Jeff Alami
Linux For Dummies Quick Reference, 2nd Edition
by Harvey Friedman
Conix 3-D Explorer
by Michael J. Hammel
by James Lee
Take Command grep: Searching for Words
by Jan Rooijackers
grep: Searching for Words A command to help you find a specific word or a sentence in a file.
Kernel Korner Linux 2.2 and the Frame-Buffer Console
by Joseph Pranevich
Linux 2.2 and the Frame-Buffer Console Wondering about the new frame-buffer features in the kernel? Mr. Pranevich gives us the scoop.
At the Forge
Writing Modules for mod_perl
by Reuven M. Lerner
The Cutting Edge Security Research Laboratory and Education Center
by Joseph Pranevich
Security Research Laboratory and Education Center The world-class research center at Purdue University is getting serious about cutting edge development of security related projects.
Linux Apprentice Windows/Linux Dual Boot
by Vince Veselosky
Windows/Linux Dual Boot Don't want to give up Windows while you learn Linux? Here's how to use both on the same machine
Focus on Software
by David A. Bandel
Take Command Good Ol' sed
by Hans de Vreught
Good Ol' sed A nice little command to help you modify files.
More Letters to the Editor
From the Publisher A Look to the Future
by Phil Hughes
Best of Technical Support
DECnet Network Protocol
This article contains information on how to use and configure available DECnet software as well as information on how the kernel code works.
The Xxl Spreadsheet Project
This paper is a general presentation of the Xxl project and of its latest version, describing the choices that drove the design of Xxl and its main charactertistics.
Network Programming with Perl
Using Perl to make network task is easy—here's how.
Linux in Enterprise Network Management
Providing Network information to customers on an intranet saves both time and money for this international chemical company.
Alphabet Soup: The Internationalization of Linux, Part 2
Mr. Turnbull takes a look at the problems faced with different character sets and the need for standardization.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide