Linux Journal Contents #173, September 2008
Feeling a bit like a Thermian? Never give up, never surrender! Someday, you could go from underdog to top dog. Just take a look at a few of the underdogs we highlight in this issue: Mutt, djbdns, Nginix, Gentoo, Xara and the program voted mostly likely to fail just a few years back—Firefox. If Firefox not radical enough for you, check out Chef Marcel's column for some more alternatives. Having trouble mapping your program data to your relational database? If so, Rueven Lerner shows you some tricks in his At The Forge column. Need to run GUI applications on your server in the next state? In his Paranoid Penguin column, Mick Bauer shows you how to do it securely. Kyle Rankin keeps hacking and slashing and shows you a few split screen secrets you may not be familiar with. Finally, we all know what happens next February, but only Doc knows what happens afterward.
Power Up Your E-Mail with Mutt
by Victor Gregorio
See how Mutt's text-based display outperforms the rest.
Nginx: the High-Performance Web Server and Reverse Proxy
by Will Reese
A leaner, meaner Apache.
djbdns: More Than Just a Mouthful of Consonants
by Cory Wright
Upgrade from BIND to djbdns.
by Dan Sawyer
Check out Xara Extreme, a Linux-compatible alternative to Inkscape.
Take a Ride on the Gentoo Train
by Mike Diehl
Gentoo, power and flexibility, but not for the faint of heart.
The Story of Firefox: from Underdog to Superhero
by James Gray
The fascinating story of how Firefox went from underdog to top-dog browser.
State of the Art: Linux Audio 2008
by Dave Phillips
How does Linux sound these days? Dave Phillips gets his groove on in Part I of his survey of Linux audio capabilities.
Shawn Powers' Current_Issue.tar.gz
When Underdogs Take Over the World
Reuven M. Lerner's At the Forge
Shoehorning Data into a Database
Marcel Gagné's Cooking with Linux
Browsers with the Speed of Lightning
Dave Taylor's Work the Shell
Spreading Out Numbers
Mick Bauer's Paranoid Penguin
Secured Remote Desktop/Application Sessions
Kyle Rankin's Hack and /
Do the Splits
Doc Searls' EOF
What Happens after Next February?
Simplifying Backups with Zmanda Recovery Manager
by Alolita Sharma
In Every Issue
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- Using tshark to Watch and Inspect Network Traffic
- The True Internet of Things
- September 2015 Issue of Linux Journal: HOW-TOs
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- Firefox Security Exploit Targets Linux Users and Web Developers
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag