I've been building computers since the 1990s, so I've seen a lot of
new technologies work their way into the mainstream. Most were the
steady, incremental improvements predicted by Moore's law, but others were
game-changers, innovations that really rocketed performance forward in a
surprising way. more>>
I am reporting the Linux project activity for the past two months in this article. Blame it on me being heads down to get some development work done. Without further ado, let's get started on catching up.
As a software developer myself, I have seen developers rushing to finish the
feature they are assigned to, with little or no consideration for security
in the code—no security guidelines, no coding standards, just a mad
to finish the feature. Next comes the security review, in which the
software obviously fails, and then comes the security-hardening phase.
Whether you're a fan of the shambling brain-munchers or you prefer
your undead to sprint from victim to victim, zombies are amazingly
popular. In an ironic twist, the most unhealthy members of humanity,
or former members, can help you become the healthiest!
Many of us grew up with LOGO, the kid-friendly programming language that
guided a little turtle around a screen. Yes, it was simplistic. Yes,
it taught only the very basics of programming concepts, but it also
inspired an entire generation of programmers. The applications you run
every day were written by people who steered a digital turtle around a
screen in third grade.
It's been months, and I'm still dealing with a DDOS (distributed
denial of service) attack on my server—an attack that I can see is coming
from China, but there's not really much I can do about it other
than try to tweak firewall settings and so on.
Like IPv6, DNSSEC is one of those great forward-looking protocols that
unfortunately hasn't seen wide adoption yet. Before I implemented it myself, I
could see why. Although some people think BIND itself is difficult to set up, DNSSEC
adds an extra layer of keys, key management and a slew of additional DNS
Imagine what Puerto Rico would be like, if free software could become a movement for social justice on the island. Well, on Tuesday, February 11th, 2014, the Institute for a Free Puerto Rico planted the seed for this movement. more>>
My favorite scene in Star Trek IV is when Scotty tries to use the
computer in the 1980s. When he's told he must use the mouse, he responds,
"how quaint", and then proceeds to try speaking into the mouse for the
computer to respond. more>>
Open-source software developers have created an array of amazing programs
that provide a great working environment with rich functionality. At
work and at home, I routinely run Linux on my desktop, using Firefox
and LibreOffice for most of my daily tasks. I prefer to run open-source
software tools, and I think most Linux Journal readers do too. more>>
Although its timetable may not always be ideal, Valve has come through for
Linux users lately. Not only has it released a native Linux version
of Steam (with many native games!), it also has expanded its Linux
support as the basis for its standalone SteamBox. The first step toward
a Steam-powered console is the operating system. more>>
Free IBM Cloud Platform for developers…yeah, that’s a big deal. That platform being based on the
latest IBM POWER7 and POWER7+ processor-based servers running Linux, AIX and IBM i operating
systems…very big deal indeed!
In past articles, I have looked at distributions that were built with
some scientific discipline in mind. In this article, I take a look
at yet another one. In this case, I cover what is provided
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.