Linux Journal Contents #68, December 1999
by Marjorie Richardson
Workings of a Virtual Private Network, Part 1
by David Morgan
A look into VPNs—what they are and how they work.
Corporate Linux: Coexisting with the Big Boys
by Markolf Gudjons
Integrating Linux into a large scale production network running SPARCs and Windows.
Post-Installation Security Procedures
by Eddie Harari
This article discusses a few of the many procedures we must take after the install is done, so that the system will not be trivial to hack.
Securing Name Servers on UNIX
by Nalneesh Gaur
Because the DNS plays such a vital role in the Internet, it is important that this service be protected and secured.
1999 Editors' Choice Awards
by Jason Kroll, Marjorie Richardson, Doc Searls and Peter Salus
Once again, it is time to present our annual awards to those we feel deserve recognition for their contributions to forwarding the Linux cause in the real world.
by Ibrahim Haddad
The purpose of this article is to introduce the readers to X-ISP.
by Marcel Gagné
Psst! Want to create a Windows broadcast fax system with web-based administration using Linux? Come over here and we'll talk.
Hell's Kitchen Systems, Inc.
by Craig Knudsen
Hell's Kitchen Systems, Inc. (HKS) started in 1994 in the Hell's Kitchen neighborhood of Manhattan and moved to Pittsburgh in 1997. Their flagship product is CCVS, a commercial credit card processing system.
Guido van Rossum
by Phil Hughes
Phil and Guido stroll through the waterfront at Monterey and discuss Python.
Free Clues from Eric
by Doc Searls
Doc talks to Eric Raymond about what he has been up to lately.
by Jim Moore
by Patrick Lambert
by Jason Kroll
Developing Linux Applications with GTK+ and GDK
by Michael Hammel
Take Command : lpd: Getting the Hard Copy
by Michael Hughes
How to set up local and networked printing services in Linux.
Kernel Korner Implementing Linux System Calls
by Jorge Manjarrez-Sanchez
How to create and install a system call in Linux and install interrupts for controlling the serial port.
At the Forge A Web-Based Clipping Service
by Reuven M. Lerner
The Cutting Edge Effectively Utilizing 3DNow! in Linux
by Jonathan Bush and Timothy S. Newman
A description of the 3DNow! technology and its impact on machine performance.
Focus on Software Focus on Software
by David A. Bandel
Penguin's Progress: Millennial Musings—Y2K
by Peter Salus
Linux for Suits A Tale of Two Markets
by Doc Searls
Best of Technical Support
Army National Guard Using Linux
by Richard Ridgeway
The Army migrates a war game tool from Hewlett Packard 700 series workstations using HP-UX to Intel-based Linux workstations.
by Federico and Christian Pellegrin
This article describes how to split an existing network without affecting the configuration of the machines already present by using the proxy arp technique.
Customizing the XDM Login Screen
by Brian Lane
How would you like your screen to look on start up? Here's how to make it look your way.
by Cosimo Leipold
Mr. Leipold explains what Kerberos is and why you want to use it.
What Can You Expect?--A Data Collection Project Using Linux
by Denny Fox
The author describes the end-to-end process of defining and implementing a data collection project using Linux. The project illustrates the use of Expect, stty, cron, a little C programming, gnuplot and ioctl to the serial device.
The Use of Linux in an Embedded System
by Dave Pfaltzgraff
One company's solution to a customer problem using Linux and open-source software.
Building a Firewall with IP Chains
by Pedro Bueno
A quick introduction to the program ipchains.
Porting Progress Applications to Linux
by Thomas Barringer
An explanation of the work required to take an existing Progress application and deploy it on Linux, and the advantages and disadvantages of doing so.
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Readers' Choice Awards 2013
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- The Many Paths to a Solution
- Securing the Programmer
- Downloading an Entire Web Site with wget
- Nativ Disc
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide