Linux Journal Contents #191, March 2010
Taming the Beast
by Jason Allen
An introduction to large-scale system administration.
AlienVault: the Future of Security Information Management
by Jeramiah Bowling
OSSIM: giving security management a brain.
Use SSH to Cross a Suspect Host Securely
Don't fear the Valley of the Shadow of Death. SSH through it.
Using an SMS Server to Provide a Robust Alerting Service for Nagios
by Eric Pearce
Texting: not just for teenagers.
Running Ubuntu 9.10 under Amazon's Elastic Cloud
by Bill Childers
No servers? No problem, with servers in the cloud!
Reuven M. Lerner's At the Forge
Dave Taylor's Work the Shell
Still Parsing the Twitter Stream
Mick Bauer's Paranoid Penguin
Linux VPNs with OpenVPN, Part II
Kyle Rankin's Hack and /
Linux Troubleshooting, Part I: High Load
Dirk Elmendorf's Economy Size Geek
Kyle Rankin and Bill Childers'
/opt vs. /usr/local
Doc Searls' EOF
A Cloud of One's Own
Axigen Mail Server
by Mitch Frazier
In Every Issue
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Android Browser Security--What You Haven't Been Told
- Readers' Choice Awards 2013
- Epiq Solutions' Sidekiq M.2
- Nativ Disc
- The Many Paths to a Solution
- Synopsys' Coverity
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Returning Values from Bash Functions
- Securing the Programmer
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide