Linux Journal Contents #173, September 2008
Feeling a bit like a Thermian? Never give up, never surrender! Someday, you could go from underdog to top dog. Just take a look at a few of the underdogs we highlight in this issue: Mutt, djbdns, Nginix, Gentoo, Xara and the program voted mostly likely to fail just a few years back—Firefox. If Firefox not radical enough for you, check out Chef Marcel's column for some more alternatives. Having trouble mapping your program data to your relational database? If so, Rueven Lerner shows you some tricks in his At The Forge column. Need to run GUI applications on your server in the next state? In his Paranoid Penguin column, Mick Bauer shows you how to do it securely. Kyle Rankin keeps hacking and slashing and shows you a few split screen secrets you may not be familiar with. Finally, we all know what happens next February, but only Doc knows what happens afterward.
Power Up Your E-Mail with Mutt
by Victor Gregorio
See how Mutt's text-based display outperforms the rest.
Nginx: the High-Performance Web Server and Reverse Proxy
by Will Reese
A leaner, meaner Apache.
djbdns: More Than Just a Mouthful of Consonants
by Cory Wright
Upgrade from BIND to djbdns.
by Dan Sawyer
Check out Xara Extreme, a Linux-compatible alternative to Inkscape.
Take a Ride on the Gentoo Train
by Mike Diehl
Gentoo, power and flexibility, but not for the faint of heart.
The Story of Firefox: from Underdog to Superhero
by James Gray
The fascinating story of how Firefox went from underdog to top-dog browser.
State of the Art: Linux Audio 2008
by Dave Phillips
How does Linux sound these days? Dave Phillips gets his groove on in Part I of his survey of Linux audio capabilities.
Shawn Powers' Current_Issue.tar.gz
When Underdogs Take Over the World
Reuven M. Lerner's At the Forge
Shoehorning Data into a Database
Marcel Gagné's Cooking with Linux
Browsers with the Speed of Lightning
Dave Taylor's Work the Shell
Spreading Out Numbers
Mick Bauer's Paranoid Penguin
Secured Remote Desktop/Application Sessions
Kyle Rankin's Hack and /
Do the Splits
Doc Searls' EOF
What Happens after Next February?
Simplifying Backups with Zmanda Recovery Manager
by Alolita Sharma
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Humble Hacker?
- The Death of RoboVM
- Why Python?
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- On Your Marks, Get Set...Gutsy Gibbon!
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide