Linux Journal Contents #68, December 1999
by Marjorie Richardson
Workings of a Virtual Private Network, Part 1
by David Morgan
A look into VPNs—what they are and how they work.
Corporate Linux: Coexisting with the Big Boys
by Markolf Gudjons
Integrating Linux into a large scale production network running SPARCs and Windows.
Post-Installation Security Procedures
by Eddie Harari
This article discusses a few of the many procedures we must take after the install is done, so that the system will not be trivial to hack.
Securing Name Servers on UNIX
by Nalneesh Gaur
Because the DNS plays such a vital role in the Internet, it is important that this service be protected and secured.
1999 Editors' Choice Awards
by Jason Kroll, Marjorie Richardson, Doc Searls and Peter Salus
Once again, it is time to present our annual awards to those we feel deserve recognition for their contributions to forwarding the Linux cause in the real world.
by Ibrahim Haddad
The purpose of this article is to introduce the readers to X-ISP.
by Marcel Gagné
Psst! Want to create a Windows broadcast fax system with web-based administration using Linux? Come over here and we'll talk.
Hell's Kitchen Systems, Inc.
by Craig Knudsen
Hell's Kitchen Systems, Inc. (HKS) started in 1994 in the Hell's Kitchen neighborhood of Manhattan and moved to Pittsburgh in 1997. Their flagship product is CCVS, a commercial credit card processing system.
Guido van Rossum
by Phil Hughes
Phil and Guido stroll through the waterfront at Monterey and discuss Python.
Free Clues from Eric
by Doc Searls
Doc talks to Eric Raymond about what he has been up to lately.
by Jim Moore
by Patrick Lambert
by Jason Kroll
Developing Linux Applications with GTK+ and GDK
by Michael Hammel
Take Command : lpd: Getting the Hard Copy
by Michael Hughes
How to set up local and networked printing services in Linux.
Kernel Korner Implementing Linux System Calls
by Jorge Manjarrez-Sanchez
How to create and install a system call in Linux and install interrupts for controlling the serial port.
At the Forge A Web-Based Clipping Service
by Reuven M. Lerner
The Cutting Edge Effectively Utilizing 3DNow! in Linux
by Jonathan Bush and Timothy S. Newman
A description of the 3DNow! technology and its impact on machine performance.
Focus on Software Focus on Software
by David A. Bandel
Penguin's Progress: Millennial Musings—Y2K
by Peter Salus
Linux for Suits A Tale of Two Markets
by Doc Searls
Best of Technical Support
Army National Guard Using Linux
by Richard Ridgeway
The Army migrates a war game tool from Hewlett Packard 700 series workstations using HP-UX to Intel-based Linux workstations.
by Federico and Christian Pellegrin
This article describes how to split an existing network without affecting the configuration of the machines already present by using the proxy arp technique.
Customizing the XDM Login Screen
by Brian Lane
How would you like your screen to look on start up? Here's how to make it look your way.
by Cosimo Leipold
Mr. Leipold explains what Kerberos is and why you want to use it.
What Can You Expect?--A Data Collection Project Using Linux
by Denny Fox
The author describes the end-to-end process of defining and implementing a data collection project using Linux. The project illustrates the use of Expect, stty, cron, a little C programming, gnuplot and ioctl to the serial device.
The Use of Linux in an Embedded System
by Dave Pfaltzgraff
One company's solution to a customer problem using Linux and open-source software.
Building a Firewall with IP Chains
by Pedro Bueno
A quick introduction to the program ipchains.
Porting Progress Applications to Linux
by Thomas Barringer
An explanation of the work required to take an existing Progress application and deploy it on Linux, and the advantages and disadvantages of doing so.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide