Pushing the envelope on mobile wireless devices, Navicron recently introduced two new products: fusionplatform, a reference, high-performance, mobile entertainment engine; and fusionsoftware, a Linux-based platform with a GTK-based front end for application development. Navicron stresses the integration value of the two products that are “designed from the ground up and optimized for wireless consumer electronics and handheld products based on Linux” or other OSes. Fusionplatform contains a powerful multimedia application processor and support for the latest wireless standards and multimedia features. Components can be added, left out and upgraded/downgraded simply. Navicron also cites advantages from using open source, which offers “unparalleled mobile multimedia experiences to consumers”.
In yet another instance of Linux's agility on diverse devices, Azingo has released Azingo Mobile, a suite of open mobile software and services that help companies deliver rich multimedia experiences to a wider range of mobile phones. Based on LiMo Foundation specifications, the suite allows handset makers and operators to “plug in” a comprehensive and pre-integrated mobile middleware framework that provides a variety of out-of-the-box applications and an Eclipse-based SDK. Azingo says that the product accelerates time to market and allows for lower-cost phones to offer the latest multimedia and UI innovations. The Linux-based software platform also includes a feature-rich browser; a highly configurable UI; media players for music, video and photos; a mobile-optimized Linux kernel and more. Finally, Azingo says that its platform can be integrated into new handset and chipset designs.
If security is on your shoulders, you may want to get insights from the new book No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long and Kevin Mitnick and published by Syngress. No Tech is an irreverent, behind-the-scenes memoir of two professional hackers wreaking havoc. Long and Mitnick take the readers along as they break in to buildings, slip past industrial-grade firewalls and scores of other high-tech protection systems put up to thwart intruders. After hundreds of jobs, the authors reveal their secrets behind bypassing every conceivable security system. Included are photos, videos and stories that show how vulnerable the high-tech world is to no-tech attacks.
Please send information about releases of Linux-related products to James Gray at firstname.lastname@example.org or New Products c/o Linux Journal, 1752 NW Market Street, #200, Seattle, WA 98107. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The Humble Hacker?
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- Canonical and BQ's Aquaris M10 Ubuntu Edition Tablet
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide