Linux Journal Contents #83, March 2001
by Richard Vernon
How to Be a Successful High-Tech Consultant
by Marty Larsen
Number one requirement of the successful consultant: do what you love.
by Glen Otero
Linux consulting is not really about Linux.
by Joshua Drake
Joshua gives an honest and thorough profile of the range of consultants.
Deploying the Squid Proxy Server on Linux
by Ian Spare
Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate proxy server.
Alternatives for Dynamic Web Development Projects
by Dennis Gesker
Dennis provides a starting point for developers seeking solutions for their web application development requirements.
As the Log Scrolls By...
by Gaelyne R. Gasson
Gasson shows how a few tweaks to Apache's httpd.conf file can provide a colorful web log file.
by Jose Nazario
José demonstrates how to start configuring and tweaking xinetd.
Open Source in MPEG
by Leonardo Chiariglione
A History of MPEG.
Kernel Korner Running Linux with Broken Memory
by Rick van Rein
At the Forge Introducing SOAP
by Reuven M. Lerner
Cooking with Linux Not Cooking the Books
by Marcel Gagné
GFX Debian Multiboot Installation
by Robin Rowe
Linux for Suits Return of the Bazaar
by Doc Searls
Linux in Education Maragda: Running Linux from CD
by Jordi Bataller
Paranoid Penguin Designing and Using DMZ Networks to Protect Internet Servers
by Mick Bauer
Focus on Software
by David Bandel
Focus on Embedded Systems An Interview with Greg Haerr on the Past, Present and Future of Microwindows
by Rick Lehrbaum
.org Watch Welcome!
by Leslie Proctor
Mandrake 7.2: Odyssey to Mediocrity
by Stephanie Black
The Computer Consultant's Guide, 2nd Edition
by Ralph Krause
The Blender Book
by Clifford Anderson
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide