Linux Journal Contents #63, July 1999
Science and Engineering
by Marjorie L. Richardson
Stuttgart Neural Network Simulator
by Ed Petron
Exploring connectionism and machine learning with SNNS.
Archaeology and GIS—The Linux Way
by R. Joe Brandon, Trevor Kludt and Markus Neteler
A description of an archaeology project making use of the freely available geographic information system GRASS.
Real-Time Geophysics Using Linux
by Laura Connor and Charles B. Connor
How the geophysical industry is using Linux for processing of magnetometer data.
SCEPTRE: Simulation of Nonlinear Electric Circuits
by Wolf-Rainer Novender
A look at an automatic circuit analysis program through engineering-based examples.
VMware Virtual Platform
by Brian Walters
Open Sources: Voices from the Open Source Revolution
by Doc Searls
The Complete Idiot's Guide to Linux
by Marjorie Richardson
A Geek in Paradise
by Jon “maddog” Hall
A trip to see the particle accelerator at Fermilabs by a self-professed geek.
MP3 Linux Players
by Craig Knudsen
Is MP3 the wave of the future? Mr. Knudsen describes this new technology and what it will mean to the listener.
Linux on IBM Thinkpad 750Cs
by Daniel Graves
CORBA Program Development, Part 3
by J. Mark Shacklette and Jeff Illian
A look at CORBA implementations in Java to provide interoperability between platforms.
Dev Mazumdar and Hannu Savolainen Interview
by David Phillips
Mr. Phillips gets the low down on 4Front technologies and what's happening in the world of sound.
Building a Linux Certification Program
by Dan York
A report on a community-based initiative to develop a professional certification program for Linux.
Focus on Software
by David A. Bandel
Linux Means Business Linux and E-Commerce
by Yermo Lamers
Linux and E-Commerce The experience of one company selling Windows software using Linux to build a reliable e-commerce solution.
At the Forge Personalizing “New” Labels
by Reuven M. Lerner
Personalizing “New” Labels How to let the site visitor know which documents he hasn't seen.
Guest Editorial The Point Really is Free Beer
by Eric Hughes
The Point Really is Free Beer The average Joe wants something for nothing, and Mr. Hughes wants to give it to him.
by Marjorie L. Richardson
More Letters to the Editor
Report from the Trade Show Floor
by Matthew Cunningham
Best of Technical Support
The Linux Position
by Doc Searls
Parallel Algorithms for Calculating Underground Water Qualit
by Tran Van Lang
The PVM system helps us in designing parallel processing programs for multi-computer systems. The implementation of the parallel algorithm enables the solving of large mechanic problems requiring large amounts of computer time and memory.
by Alasdair McAndrew
Introduction to Sybase, Part 2
by Jay Sissom
This month Mr. Sissom shows us how to set up and use a Sybase client written in Perl through examples.
Precision Farming and Linux: An Expose
by Gordon Haverland
Farming is not a place one would expect to fine Linux, but there it is. Mr. Haverland tells us how Linux is used in this unusual area.
UNIX awk & sed Programmer's Interactive Workbook
by Paul Dunne
The UNIX CD Bookshelf
by Derek Vadala
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Death of RoboVM
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide