Readers' Choice Awards 2008
Who would have thought that after all these years, the vi editor would rule the roost? It beat out every other editor, including Emacs and vim. Three years ago, it didn't even make the top three! Go figure. It is interesting to note that Emacs, KWrite and Kate all scored about evenly, clustering around the 10% mark.
Frozen Bubble (19.2%)
Tux Racer (11.7%)
It is beginning to seem that no game will ever knock Frozen Bubble from its lofty perch as Favorite Linux Game. Not only does Frozen Bubble lure you in with its pure simplicity, but also those penguins are just too darn cute! Doom and Tux Racer, which won honorable mentions, are two more of your favorites.
Given VMware's meteoric rise during the past few years, it's no surprise to see it win the gold for Favorite Virtualization Solution. More surprising is VirtualBox's showing, the application that a fellow publication called “The best virtualization program you've never heard of” in late 2007. VirtualBox's patron, innotek of Germany, was acquired by Sun Microsystems earlier this year, giving VirtualBox the marketing injection it needed to match its technical prowess. Wine and Xen fared decently in this category too.
Simple Linux Backup (25.5%)
In this year's competition, we differentiated between comprehensive applications, or systems, and specific utilities. Regarding the Favorite Backup System category, most of you prefer the no-frills, low-budget approach over corporate solutions—that is, the application Simple Linux Backup. The open-source applications—Amanda, with the Zmanda interface for server backup, and Bacula, for network-based backup—also got many of your votes. Backup also is the category in which the most readers roll their own script-based solutions.
For Favorite Backup Utility, the perpetual winner is the workhorse tar, tallying 35.4% of the vote. Enough of you love rsync and the CD/DVD-authoring application k3b to warrant honorable mentions.
MySQL is not only the world's most popular open-source database, it's your favorite as well. Although PostreSGL, SQLite, Firebird and others registered votes, the competition was not fierce. It doesn't hurt that MySQL runs on more than 20 different platforms.
'Twas the battle of the Cs in the Favorite Programming Language category, with C taking first prize, C++ landing in second and Java in the third spot. Don't see your own wildly favorite language here? You wouldn't believe the number of “WTFs” we got when readers didn't find Python, Ruby or other languages here but rather in the scripting language category. Check out that category's results, as well as Michael Baxter's explanation in the sidebar for how we differentiated between programming and scripting languages. (No doubt we'll see you in the on-line comments section too!)
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide