Linux Journal Contents #188, December 2009
If last month's Infrastrucuture issue was too "big" for you then try on this month's Embedded issue. Find out how to use Player for programming mobile robots, build a humidity controller for your root cellar, find out how to reduce the boot time of your embedded system, and if you're new to embedded systems find out the basics that go into one. You can also read about the Beagle Board, the Mesh Potato and a spate of other interestingly named items. And along with our regular columns don't miss our new monthly column: Economy Size Geek.
Playing with the Player Project
by Kevin Sikorski
Programming mobile robots to interface with sensors, actuators and robots.
Introduction: a Typical Embedded System
by Johan Thelin
The common parts that go into an embedded Linux system.
Controlling the Humidity with an Embedded Linux System
by Jeffrey Ramsey
It's not the heat; it's the humidity.
Reducing Boot Time in Embedded Linux Systems
by Christopher Hallinan
The years fly, but the seconds can drag on forever.
The Mesh Potato
by David Rowe
Everybody loves a good Spud!
Isolated Multisession Workstations
by Jorge Salgado
Access Ubuntu, Windows, Mac OS and Citrix from the same workstation.
Reuven M. Lerner's At the Forge
2009 Book Roundup
Dave Taylor's Work the Shell
Calculating the Distance between Two Latitude/Longitude Points
Kyle Rankin's Hack and /
Message for You Sir
Dirk Elmendorf's Economy Size Geek
A Pico-Sized Platform with Potential
Doc Searls' EOF
Is “Open Phone” an Oxymoron?
The Goggles, They Do Something
by Kyle Rankin
In Every Issue
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- The Humble Hacker?
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide