Linux Journal Contents #85, May 2001
Focus: Training and Certification
by Richard Vernon
Training Digital Divide Warriors
by Ana Maria Harkins
The skinny on training techno missionaries.
An Accurate Assesment?
by Richard Morgan
A review of the LPIC process.
Why Be Certified?
by Tobin Maginnis
The value of certification.
Using Python to Query MySQL over the Net
by Mihai Bisca
Use Python to upgrade your site's search.
MOSIX: A Cluster Load-Balancing Solution for Linux
by Ibrahim F. Haddad and Evangeline Paquin
A clustered Linux telecom-grade internet server.
by Ralph Krause
The Apache Toolbox simplifies installation and configuration of the Apache web server.
Boot with GRUB
by Wayne Marshall
Run multiple OSes with free GRUB.
Take Command An Introduction to DNS and DNS Tools
by Neil Anuskiewicz
Kernel Korner Linux Teleconferencing: Improving the Wireless Network
by Izzet Agoren
At the Forge JavaServer Pages
by Reuven M. Lerner
Cooking with Linux Fly Me to the Wine Cellar
by Marcel Gagné
Paranoid Penguin Checking Your Work with Scanners, Part I (of II): nmap
by Mick Bauer
Focus on Software
by David Bandel
Linux for Suits
Adjusting to Life in the Bazaar
by Doc Searls
Focus on Embedded Systems
The embedded side of LinuxWorld
by Rick Lehrbaum
Games Penguins Play
SimCity 3000 Unlimited for Linux
by Neil Doane
A call to action
by Leslie Proctor
The PC Weasel 2000
by Jon Valesh
Core Python Programming
by Michael Baxter
Professional Linux Programming
by Stephanie Black
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide