Linux Journal Contents #167, March 2008
The March 2008 issue of Linux Journal focuses on Desktops. This month features an interview by Doc Searls with David Liu, the CEO of Good OS LLC. The gOS is an “Ubuntu-based distro tweaked to run Web apps as if they were deskotp ones”. Our columnists focus on desktop issues as well—Mick Bauer outlines Ubuntu's security features and Marcel Gagné discusses remote desktop sharing. Plus, Jes Hall previews the revolutionary KDE 4 and Willie Walker and Eitan Isaacson discuss desktop accessibility issues.
This month's LJ also features several cool product reviews—Jes Hall on the ASUS Eee PC, Bruce Byfield on IBM's Lotus Symphony and Adam Dutko on Android, the Google Mobile Linux Framework.
As always, there's much more—from Linux video editors to maximizing desktop speed to understanding Google Gadgets. Enjoy the issue!
by Dan Sawyer
Here's the guide to what you must have to slide easily into the Linux desktop experience.
Behind the Low-End Linux Box that Sold Out at Wal-Mart
by Doc Searls
Doc Searls interviews Dave Liu of gOS.
KDE 4 Preview
by Jes Hall
A peek at the revolutionary new version of KDE.
Orca—Take the Killer Whale for a Ride
by Willie Walker
The Orca screen reader helps people with visual impairments access the desktop. It also can serve as a useful tool for developers to check their applications for accessibility.
Make Your Application Accessible with Accerciser
by Eitan Isaacson
Find and solve access issues; your users will thank you.
Multitrack Video Editor Roundup
by Dan Sawyer
Video editing in Linux continues to improve.
Maximize Desktop Speed
by Federico Kereki
Linux is known for its speed, even on older hardware, but you will appreciate it even more after making these performance-enhancing tweaks.
Reuven M. Lerner's At the Forge
OpenSocial and Google Gadgets
Marcel Gagné's Cooking with Linux
My Desktop Lies over the Ocean
Dave Taylor's Work the Shell
Understanding Shell Script Shorthand
Mick Bauer's Paranoid Penguin
Security Features in Ubuntu
Kyle Rankin's Hack and /
Automate Your Desktop with wmctrl
Doc Searls' EOF
Driving Markets from Our Own Kernels
ASUS Eee PC
by Jes Hall
IBM's Unfinished Symphony
by Bruce Byfield
Domo Arigato Mr Androidato–An Introduction to the New Google Mobile Linux Framework, Android
by Adam M. Dutko
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide