LJ Archive

Linux Journal Issue #177/January 2009


Yubikey  by Dirk Merkel
Learn how to increase system and on-line security.
Cold Boot Attack Tools for Linux  by Kyle Rankin
Use open-source tools to dump and scan RAM from a target system for encyption keys and other goodies.
PAM—Securing Linux Boxes Everywhere  by Federico Kereki
How to implement Linux security checks.
Testing the Locks: Verifying Security in a Linux Environment  by Jeramiah Bowling
Four checks for a more secure network.


MinorFs  by Rob Meijer
A set of user-space filesystems for enhanced discretionary access control.
Detecting Botnets  by Grzegorz Landecki
Using Darknet to secure environments from threats in the wild.
MythVideo: Managing Your Videos  by Michael J. Hammel
Too many videos in your MythTV menu? With a little planning, finding your favorite movies can be a breeze
Using Capistrano  by Dan Frost
Simplify application deployment.


Reuven M. Lerner's At the Forge   Memcached Integration in Rails  
Marcel Gagné's Cooking with Linux   Evil Agents under the Bed and Other Scary Things that Go Boom!  
Dave Taylor's Work the Shell   Special Variables I: the Basics  
Mick Bauer's Paranoid Penguin   Samba Security, Part III  
Kyle Rankin's Hack and /   Manage Multiple Servers Efficiently  
Kyle Rankin and Bill Childers' Point/Counterpoint   Small Laptops vs. Large Laptops  
Doc Searls' EOF   The Power of Definitions  


Mixing It Up with the Behringer BCF2000  by Dan Sawyer

In Every Issue

New Products  
New Projects  
LJ Archive