I've tried pretty much every IRC client available for both Linux and
OS X. (I use both platforms during my day job.) No matter how many times I
try to find a GUI application that meets my needs, I always turn back to
In my last article, I started a series called Command-Line Cloud. The intent of
the series is to discuss how to use the cloud services we are faced
with these days without resorting to a Web browser. I spend most of my
time on the command line, so that's where I'd most like to interface with
cloud services. more>>
With the increasing prevalence of open-source implementations and the
expansion of personal computing device usage to include mobile and non-PC
devices as well as traditional desktops and laptops, combating attacks and
security obstacles against malware is a growing priority for a broad
community of vendors, developers and end users. more>>
Take on "dependency hell" with Docker containers, the lightweight and nimble cousin
of VMs. Learn how Docker makes applications portable and isolated by packaging them
in containers based on LXC technology.
Git has become the most popular version-tracking platform around for
open-source projects. Whether you're using GitHub, Gitorious, Bitbucket or
or even if you're hosting the git repository yourself, accessing
the code is something us Linux users take for granted. more>>
If you run a publicly accessible Web server for your own use (and let's
face it, if you're reading Linux Journal, there's a very good chance you
do), how do you go about limiting the risk of someone accessing your
site and doing bad things? How about SSH, an even bigger concern? more>>
Setting up Web servers is fairly simple. In fact, it's so simple that
once the server is set up, we often don't think about it anymore. It
wasn't until I had a very large Web site rollout fail miserably that I
started to research a method for load-testing servers before releasing
a Web site to production.
I have a love/hate relationship with Waze. The idea of peer
collaboration regarding traffic, combined with the technology to
accomplish it on an enormous scale is truly amazing. Yet, every time
I've used Waze myself, it's been an exercise in frustration. It has
insisted I turn left off a bridge, and then it refused to reroute me
when I didn't. more>>
In my last article, I looked at NumPY and some of its uses in numerical
simulations. Although NumPY does provide some really robust building blocks,
it is a bit lacking in more sophisticated tools. SciPY is one of the many
Python modules that build on NumPY's. more>>
I love SSH. I mean, I really, really love SSH. It's by far the most
versatile, useful, amazingly powerful tool in my system administration
quiver. One of the problems with SSH, however, is that when it dies,
it doesn't automatically recover. Don't get me wrong. more>>
"Do you know Linux? WE AE HIRING!" That's what billboards from HostGator
have been saying for the past several years. That company is not alone. Demand for
Linux talent is high and getting higher. more>>
I know, I'm in the middle of a series of columns about how to work
with ImageMagick on the command line, but when other things arise, well, I
imagine that a lot of you are somehow involved in the management
of servers or systems, so you all understand firefighting.
In the October 2013 issue, I described the hardware and software I used to create
my "BirdTopia Monitoring Station", more commonly called BirdCam. If
you've been visiting BirdCam recently, which a surprising number of
folks have been doing, you'll notice quite a few changes (Figure 1).
In this article, I describe the upgrades, the changes and some
of the challenges along the way. more>>
At the start of this quarter
at how 2013's graphics developments were more incremental than
revolutionary, perhaps with the need for LTS stability in mind. Things
are looking quite different this year, with several major changes
quietly under way. more>>
Please send information about releases of Linux-related products
to newproducts at linuxjournal.com or New
c/o Linux Journal, PO Box 980985, Houston,
TX 77098. Submissions are edited for length and content.
Classical cryptography provides security based on unproven
mathematical assumptions and depends on the technology available to
an eavesdropper. But, these things might not be enough in the near future to
cyber security. We need something that
provides unconditional security. We need quantum cryptography.
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.