Linux Journal Contents #68, December 1999
by Marjorie Richardson
Workings of a Virtual Private Network, Part 1
by David Morgan
A look into VPNs—what they are and how they work.
Corporate Linux: Coexisting with the Big Boys
by Markolf Gudjons
Integrating Linux into a large scale production network running SPARCs and Windows.
Post-Installation Security Procedures
by Eddie Harari
This article discusses a few of the many procedures we must take after the install is done, so that the system will not be trivial to hack.
Securing Name Servers on UNIX
by Nalneesh Gaur
Because the DNS plays such a vital role in the Internet, it is important that this service be protected and secured.
1999 Editors' Choice Awards
by Jason Kroll, Marjorie Richardson, Doc Searls and Peter Salus
Once again, it is time to present our annual awards to those we feel deserve recognition for their contributions to forwarding the Linux cause in the real world.
by Ibrahim Haddad
The purpose of this article is to introduce the readers to X-ISP.
by Marcel Gagné
Psst! Want to create a Windows broadcast fax system with web-based administration using Linux? Come over here and we'll talk.
Hell's Kitchen Systems, Inc.
by Craig Knudsen
Hell's Kitchen Systems, Inc. (HKS) started in 1994 in the Hell's Kitchen neighborhood of Manhattan and moved to Pittsburgh in 1997. Their flagship product is CCVS, a commercial credit card processing system.
Guido van Rossum
by Phil Hughes
Phil and Guido stroll through the waterfront at Monterey and discuss Python.
Free Clues from Eric
by Doc Searls
Doc talks to Eric Raymond about what he has been up to lately.
by Jim Moore
by Patrick Lambert
by Jason Kroll
Developing Linux Applications with GTK+ and GDK
by Michael Hammel
Take Command : lpd: Getting the Hard Copy
by Michael Hughes
How to set up local and networked printing services in Linux.
Kernel Korner Implementing Linux System Calls
by Jorge Manjarrez-Sanchez
How to create and install a system call in Linux and install interrupts for controlling the serial port.
At the Forge A Web-Based Clipping Service
by Reuven M. Lerner
The Cutting Edge Effectively Utilizing 3DNow! in Linux
by Jonathan Bush and Timothy S. Newman
A description of the 3DNow! technology and its impact on machine performance.
Focus on Software Focus on Software
by David A. Bandel
Penguin's Progress: Millennial Musings—Y2K
by Peter Salus
Linux for Suits A Tale of Two Markets
by Doc Searls
Best of Technical Support
Army National Guard Using Linux
by Richard Ridgeway
The Army migrates a war game tool from Hewlett Packard 700 series workstations using HP-UX to Intel-based Linux workstations.
by Federico and Christian Pellegrin
This article describes how to split an existing network without affecting the configuration of the machines already present by using the proxy arp technique.
Customizing the XDM Login Screen
by Brian Lane
How would you like your screen to look on start up? Here's how to make it look your way.
by Cosimo Leipold
Mr. Leipold explains what Kerberos is and why you want to use it.
What Can You Expect?--A Data Collection Project Using Linux
by Denny Fox
The author describes the end-to-end process of defining and implementing a data collection project using Linux. The project illustrates the use of Expect, stty, cron, a little C programming, gnuplot and ioctl to the serial device.
The Use of Linux in an Embedded System
by Dave Pfaltzgraff
One company's solution to a customer problem using Linux and open-source software.
Building a Firewall with IP Chains
by Pedro Bueno
A quick introduction to the program ipchains.
Porting Progress Applications to Linux
by Thomas Barringer
An explanation of the work required to take an existing Progress application and deploy it on Linux, and the advantages and disadvantages of doing so.
Webinar: 8 Signs You’re Beyond Cron
11am CDT, April 29th
Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.Join us!
- March 2015 Issue of Linux Journal: High-Performance Computing
- Users, Permissions and Multitenant Sites
- Not So Dynamic Updates
- April 2015 Video Preview
- Security in Three Ds: Detect, Decide and Deny
- New Products
- Flexible Access Control with Squid Proxy
- DevOps: Everything You Need to Know
- Tighten Up SSH
- Android Candy: Bluetooth Auto Connect