Subscribe: Linux Journal - The Original Magazine of the Linux Community
http://www.linuxjournal.com/news.rss&subh=Linux%20Journal
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
business  cloud  data mining  data  linux community  linux  more>>  open source  poe  security  source software  systems  thought  world 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Linux Journal - The Original Magazine of the Linux Community

Linux Journal - The Original Magazine of the Linux Community



Since 1994: The Original Monthly Magazine of the Linux Community



 



Banana Backups

Tue, 21 Nov 2017 15:58:49 +0000

In the September 2016 issue, I wrote an article called "Papa's Got a Brand New NAS" where I described how I replaced my rackmounted gear with a small, low-powered ARM device—the Odroid XU4. more>>

(image)



Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers

Mon, 20 Nov 2017 15:19:36 +0000

Sponsored Post:

more>>

It is always a philosophical debate as to whether to use open source software in a regulated environment. Open source software is crowd sourced, and developers from all over the world contribute to packages that are later included in Operating System distributions.(image)



Zentera Systems, Inc.'s CoIP Security Enclave

Wed, 15 Nov 2017 12:38:33 +0000

On the heels of being crowned "Cool Vendor in Cloud Security" by Gartner, Zentera Systems, Inc., announced an upgrade to its flagship CoIP Security Enclave solution. more>>

(image)



Sysadmin 101: Patch Management

Tue, 14 Nov 2017 12:23:19 +0000

A few articles ago, I started a Sysadmin 101 series to pass down some fundamental knowledge about systems administration that the current generation of junior sysadmins, DevOps engineers or "full stack" developers might not learn otherwise. I had thought that I was done with the series, but then the WannaCry malware came out and exposed some of the poor patch management practices still more>>

(image)



pfSense: Not Linux, Not Bad

Mon, 13 Nov 2017 10:28:25 +0000

Through the years, I've used all sorts of router and firewall solutions at home and at work. For home networks, I usually recommend something like DD-WRT, OpenWRT or Tomato on an off-the-shelf router. For business, my recommendations typically are something like a Ubiquiti router or a router/firewall solution like Untangled or ClearOS. more>>

(image)



NETGEAR 48-Port Gigabit Smart Managed Plus Switch (GS750E)

Fri, 10 Nov 2017 16:12:57 +0000

More than ever, small to mid-sized businesses demand and rely on their networks to carry out mission-critical business activities. As always, however, budgets and expertise constrain these companies from using complex managed switches to run their networks. more>>

(image)



New Hope for Digital Identity

Thu, 09 Nov 2017 11:14:00 +0000

Identity is personal. You need to start there.

In the natural world where we live and breathe, personal identity can get complicated, but it's not broken. If an Inuit family from Qikiqtaaluk wants to name their kid Anuun or Issorartuyok, they do, and the world copes. If the same kid later wants to call himself Steve, he does. Again, the world copes. So does Steve. more>>

(image)



DivvyCloud Platform for VMware Cloud on AWS

Wed, 08 Nov 2017 14:03:52 +0000

DivvyCloud's unique niche in the IT ecosystem is helping organizations automate and manage their multi-cloud infrastructure at scale. more>>

(image)



Slicing Scientific Data

Tue, 07 Nov 2017 13:53:23 +0000

I've covered scientific software in previous articles that either analyzes image information or actually generates image data for further analysis. In this article, I introduce a tool that you can use to analyze images generated as part of medical diagnostic work. more>>

(image)



Linux Journal November 2017

Tue, 07 Nov 2017 12:00:00 +0000

(image)

Arrogance, the Biggest Linux Security Problem

Linux is no longer an obscure platform avoided by those with malicious intent. more>>

(image)



PoE, PoE+ and Passive POE

Mon, 06 Nov 2017 12:27:45 +0000

I've been installing a lot of POE devices recently, and the different methods for providing power over Ethernet cables can be very confusing. There are a few standards in place, and then there's a method that isn't a standard, but is widely used.

802.3af or Active PoE: more>>

(image)



Galit Shmueli et al.'s Data Mining for Business Analytics (Wiley)

Fri, 03 Nov 2017 16:11:00 +0000

The updated 5th edition of the book Data Mining for Business Analytics from Galit Shmueli and collaborators and published by Wiley is a standard guide to data mining and analytics that adds two new co-authors and a trove of new material vis-á-vis its predecessor. more>>

(image)



Analyzing Song Lyrics

Thu, 02 Nov 2017 12:06:57 +0000

I was reading about the history of The Beatles a few days ago and bumped into an interesting fact. According to the author, The Beatles used the word "love" in their songs more than 160 times. At first I thought, "cool", but the more I thought about it, the more I became skeptical about the figure. In fact, I suspect that the word "love" shows up considerably more than 160 times. more>>

(image)



Testing the Waters: How to Perform Internal Phishing Campaigns

Tue, 31 Oct 2017 13:50:25 +0000

Phishing is one of the most dangerous threats to modern computing. Phishing attacks have evolved from sloppily written mass email blasts to targeted attacks designed to fool even the most cautious users. No defense is bulletproof, and most experts agree education and common sense are the best tools to combat the problem. more>>

(image)



The Wire

Mon, 30 Oct 2017 12:09:27 +0000

In the US, there has been recent concern over ISPs turning over logs to the government. During the past few years, the idea of people snooping on our private data (by governments and others) really has made encryption more popular than ever before. One of the problems with encryption, however, is that it's generally not user-friendly to add its protection to your conversations. more>>

(image)