Issue Focus: Networking

I first started my sysadmin career about the time in history when 10BASE2 was
beginning to see widespread adoption. ThinNet, as it also was called, meant an
affordable transition from the SneakerNet so many businesses used. (SneakerNet is
a term for walking floppy disks back and forth between computers—not really a ...
See more details below
Linux Journal October 2011

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
BN.com price


Issue Focus: Networking

I first started my sysadmin career about the time in history when 10BASE2 was
beginning to see widespread adoption. ThinNet, as it also was called, meant an
affordable transition from the SneakerNet so many businesses used. (SneakerNet is
a term for walking floppy disks back and forth between computers—not really a network, but it’s how data was moved.) Anyone who remembers those years knows ThinNet was extremely vulnerable to system-wide failures. A single disconnect (or stolen BNC terminator cap at the end of the chain) meant the entire network was down. That was a small price to pay for such inexpensive and blazing-fast
speed. 10Mbit was the max speed ThinNet supported, but who in the world ever
would need that much throughput?

Networking has changed a lot since my career started, and it’s issues like this one that keep me up to date. Kyle Rankin starts off with a hacking primer using an off-the-shelf home router. This isn’t merely the old WRT54G hacks you’re used to reading about. Instead, Kyle shows us how to don our black hats and really hack in to a D-Link wireless 802.11n router. If Kyle’s hacking tutorial makes you a little nervous, don’t worry; we have some network security this month as well. Henry Van Styn teaches us some advanced firewall configurations with ipset. Granted, firewalls won’t protect anyone from PHP vulnerabilities, but they still help me sleep better at night.

Mike Diehl switches gears, and instead of showing how to hack (or protect) the network, he describes how to create. Specifically, he explains how to create network programs that are cross-platform and easy to build with ENet. As someone
whose programming skills peaked with 10 GOTO 10, Mike’s idea of “easy” might be relative, but he gives coding examples, so even copy/paste programmers can join in.

Henry Van Styn has another article in this issue on how to use tcpdump to troubleshoot network issues effectively. If you’re in charge of a large network, you owe it to yourself to polish your tcpdump skills. It’s a tool every network administrator needs, and Henry takes some of the mystery out of it. Adrian Hannah follows in a one-two punch teaching us how to sniff packets effectively. Packet sniffing is one of those skills that can be used for good and evil both, but we’ll
assume you’ll use your powers for good. At the very least, you’ll understand what sort of information is available on your network so you can try to secure it a bit.

Networking also has made so many other facets of computing possible. If it weren’t for networking, we wouldn’t have cloud computing. Adrian Klaver shows how to use Python to work with Amazon Web Services. For some of you, cloud computing is scary, because you never get to access the computer you’re working on directly. One way to help alleviate the concern of working on computers far away is to
implement remote viewing. Joey Bernard covers several methods for accessing a
computer remotely, whether it’s in the next room or on the next continent. Granted, that doesn’t work for cloud-based services, but it does for remotely hosted servers, so it’s an article you’ll want to check out.

Our networks are even home to filesystems nowadays, and Petros Koutoupis shows how to deploy the Lustre distributed filesystem. Utilizing multiple nodes for file
storage is a great way to leverage your network resources for speed and redundancy. Regardless of your network speed, however, data will travel only as quickly as the hard drive underneath will send it. Kyle Rankin reviews the Intel 320 series SSD this month. If you haven’t taken the plunge to SSD, after reading about his results, you might decide that now is the time.

And, of course, for those of you who think networking is good only for accessing
your e-mail, we have articles for you this month too. Programmers will like Reuven M. Lerner’s article about his mustache— more specifically, Mustache.js, a JavaScript templating system that might be right up
your alley. Dave Taylor shows us scripters how to manipulate image files without ever leaving the command line. There’s nothing wrong with firing up The GIMP to edit a graphic file, but sometimes you just want to scale an image quickly. Dave explains how.

We’ve also got new product debuts, Linux news and interesting things I’ve stumbled across this month in the UpFront section. So whether you’re carrying this issue around on a Flash drive (SneakerNet anyone?) or downloading it wirelessly from the wireless router you just hacked, we hope you enjoy it. We certainly enjoyed making it.
Read More Show Less

Product Details

  • BN ID: 2940013339156
  • Publisher: Linux Journal
  • Publication date: 9/30/2011
  • Series: Linux Journal, #210
  • Sold by: Barnes & Noble
  • Format: eBook
  • File size: 3 MB

Meet the Author

Linux Journal
Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted December 22, 2011

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)