# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Introduction to Kismet
Use this only for good.
"Kismet detects the presence of wireless networks, including those with hidden SSIDs. It can discover and report the IP range used for a particular wireless network, as well as its signal and noise levels. Kismet can also capture or sniff all network management data packets for an available wireless network. You can use Kismet to locate available wireless networks, troubleshoot wireless networks, optimize signal strength for access points and clients, and detect network intrusions. "
Introduction to Kismet

( Permalink: Introduction to Kismet      Submitted by Noel Wed Apr 5, 2006 )

Macintosh Home Monitoring
Article on how to automate some of the stuff in your house using a Mac.
"Now don't let the words "home automation" frighten you. The approach here only scratches the surface of home automation, and uses sensors and software that are inexpensive and easy to use. In addition, we're sticking with wireless devices, so no pulling of cables or replacing existing wiring will be necessary. You won't quite be living like George Jetson, but your house will be a tad bit smarter."
MacDevCenter.com -- Macintosh Home Monitoring

( Permalink: Macintosh Home Monitoring      Submitted by Noel Wed Apr 5, 2006 )

Speed your code with the GNU Profiler
Improving the performance of your applications is rarely a wasted effort, but it's not always clear which functions the program is spending most of its execution time on. Learn how to pinpoint performance bottlenecks using gprof for both user-space and system calls on Linux.

( Permalink: Speed your code with the GNU Profiler      Submitted by Anonymous Wed Apr 5, 2006 )

backup your system using bash, tar and netcat
If things you read MUST have capital letters you may want to skip this one. Otherwise it's an interesting article. I might use SSH but netcat is probably more efficient.
"so now that you've done this, you can wait and watch all the files on your host system scroll by on the screen... be prepared to wait a long while, especially for large drives. in the meantime, go talk with your SO (remember them?), install FreeBSD or, um, go outside for a walk...trust me, it's good for you."
metashell: how to backup your linux system using bash, tar and netcat

( Permalink: backup your system using bash, tar and netcat      Submitted by Noel Tue Apr 4, 2006 )

The case of the 500-mile email
Interesting story. Not sure if I really believe all the details. But a good story.
"The pieces fell into place, all at once, and I again choked on the dregs of my now-cold latte. When the consultant had "patched the server," he had apparently upgraded the version of SunOS, and in so doing *downgraded* Sendmail. The upgrade helpfully left the sendmail.cf alone, even though it was now the wrong version. "
The case of the 500-mile email

( Permalink: The case of the 500-mile email      Submitted by Noel Tue Apr 4, 2006 )

How To Get A Provider Independent IP Address
Great example of a solution to a problem a lot of people have.
"First of all, I selected one IP (RE.AL.AD.DR) in my employer IP network and created ip-over-tcp tunnel from my home server to one of the employer's servers. It has been done using great UNIX tool vtun by Maxim Krasnyansky. Config files will be presented later in this article.At this step I got following interfaces on world server and home server sides:"
Homo-Adminus Blog How To Get Provider Independent IP Address For Your Home Server?

( Permalink: How To Get A Provider Independent IP Address      Submitted by Noel Tue Apr 4, 2006 )

WSJ.com - Mac's Moment?
Well written article about a company named Aozora and their switch to Macs.
"Within a few months, Aozora expects about 90% of its machines will be Macs. What brought on the switch? Bill Chute, Aozora's chief technology officer, says the company decided to go with Macs because of Apple's latest operating system, Mac OS X, which has made the machines more stable and functional for many business users. Before OS X, "it would have been impossible," he says, because Macs didn't have the reliability and the functions that Aozora needs."
WSJ.com - Mac's Moment?

( Permalink: WSJ.com - Mac's Moment?      Submitted by Noel Tue Apr 4, 2006 )

First look at Service Data Objects for C++
Service Data Objects provide a means of describing the structure of a graph of data elements and a means of loading a particular instance of the data based on that graph description from any data source. SDO also provides the ability to track changes to the graph of data as it is used by an application. In this article, you are introduced to the API you need to work with Service Data Objects from C++.

( Permalink: First look at Service Data Objects for C++      Submitted by Anonymous Tue Apr 4, 2006 )

The Perfect Xen 3.0 Setup For Debian
This tutorial provides step-by-step instructions on how to install Xen (version 3.0.1) on a Debian Sarge (3.1) system.

Xen lets you create guest operating systems, so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware.

This HowTo uses Debain Sarge for both the host OS (dom0) and the guest OS (domU). In an additional section at the end it will also show how to create a virtual local network with virtual machines, with dom0 being the router.


( Permalink: The Perfect Xen 3.0 Setup For Debian      Submitted by Falko Timme Mon Apr 3, 2006 )

Overview of the ten major Linux distributions
LinxForums gives short overviews of the ten major distributions, and concludes: "People often ask 'so which distribution is right for me?' The answer is very simple: 'It depends!' It depends on your needs, it depends on your experience, on your philosophy or your tastes. It depends on a lot of things, and even if you found the one you preferred among these 10 majors distributions, don't forget that there are about 340 other distributions available, which could potentially suit your needs. If you're ready for the adventure, go and explore."

( Permalink: Overview of the ten major Linux distributions      Submitted by Mark Mon Apr 3, 2006 )

Can you tell the real news from the fake?
The second annual "Spot the Spoofs" challenge. Sift through the technology news we've provided and see if you can separate the wheat from the chaff (yes, some of the stories are true!). Click on the link to check your answer.

( Permalink: Can you tell the real news from the fake?      Submitted by Anonymous Mon Apr 3, 2006 )

Setting the maximum volume limit on iPod
This could also be useful if you want to prevent accidentally blowing out your ears.
"The new 1.1.1 software update for iPod nano and Fifth Generation iPod provides an easy way for you to set a maximum volume limit to prevent the volume from exceeding a certain level. You can also assign a combination to prevent the setting from being changed which is ideal for parental control."
Setting the maximum volume limit on iPod

( Permalink: Setting the maximum volume limit on iPod      Submitted by Noel Mon Apr 3, 2006 )

10 steps to a better IT support process
Supporting users in a corporate environment can be a major pain in the behind. This article explains a methodology to help IT support workers in their day to day job.

"As an IT professional, you need to have a structured mind to be able to think through all the different problematic situations that can present themselves to you on a day to day basis. After having worked in IT for a while, you should eventually start to develop a certain methodology that will help you solve most problems quickly and effectively."

10 steps to a better IT support process

( Permalink: 10 steps to a better IT support process      Submitted by Kiltak Mon Apr 3, 2006 )

The Inner Working of a Bayesian Spam Filter
Great article that looks at what a Bayesian Spam Filter actually is.
"The Bayesian Theory, when applied to spam mail, is a very effective method of detecting which emails are legitimate or not. Bayesian filters calculate the probability of a message being spam according to its content. The more emails it sees, the more effective it gets. At first, the filter will not be perfect, but if you provide it with hundreds of emails to analyze, it should eventually achieve approximately 99.5% of efficiency."
[Geeks are Sexy] technology news: The Inner Working of a Bayesian Spam Filter

( Permalink: The Inner Working of a Bayesian Spam Filter      Submitted by Noel Fri Mar 31, 2006 )

How to Drive your Website Developer Insane
This is very funny.
"Constantly bring up your expert programmer son/cousin/close family friend. Make one up if you don't really have one! Be sure to give them the most annoying qualities possible and make sure they always give the opposite advice of the programmer actually working on the project. This programmer wants to do the site in PHP? Well, your obscure relative says ASP is really better."
alwaysstock » Blog Archive » How to Drive your Website Developer Insane: A Primer

( Permalink: How to Drive your Website Developer Insane      Submitted by Noel Fri Mar 31, 2006 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

An Interview with Falko Timme - the Perfect Linux
(Thu Feb 23, 2006)

I'm sorry, but PHP sucks!
(Thu Feb 23, 2006)

Among Linux music players, Banshee really wails
(Thu Feb 23, 2006)

Shared Resource Management on a SoC
(Thu Feb 23, 2006)

A pro-PHP Rant
(Wed Feb 22, 2006)

Interview with Mark Shuttleworth
(Wed Feb 22, 2006)

Linux Shell One-Liners
(Wed Feb 22, 2006)

Domain names as mobile phone numbers
(Wed Feb 22, 2006)

Timeline and Risk
(Tue Feb 21, 2006)

The evolution of Fedora Core Linux
(Tue Feb 21, 2006)

Developing games with Perl and SDL
(Tue Feb 21, 2006)

Introducing Lua
(Tue Feb 21, 2006)

A Look at GNOME 2.14
(Mon Feb 20, 2006)

Preventing SSH Dictionary Attacks With DenyHosts
(Mon Feb 20, 2006)

Asterisk on OpenWrt
(Mon Feb 20, 2006)

Fixing Linux with Knoppix
(Mon Feb 20, 2006)

libdvdcss2 and w32codecs for Ubuntu
(Thu Feb 16, 2006)

Test drive: Chandler PIM
(Thu Feb 16, 2006)

Everything To Know About C Types
(Thu Feb 16, 2006)

Google Windows apps coming to Linux
(Wed Feb 15, 2006)

Contrarian Minds: Bill Walster
(Wed Feb 15, 2006)

A brief history of hard drives
(Wed Feb 15, 2006)

How to Quickly Install the Solaris 10 OS
(Wed Feb 15, 2006)

Fundamentals of Massive Linux Scaling
(Tue Feb 14, 2006)

Helping the needy get nerdy
(Tue Feb 14, 2006)

msntv 2
(Tue Feb 14, 2006)

The year ahead in Java Web services
(Tue Feb 14, 2006)

How To Install ColdFusion MX 7 On Debian Sarge
(Mon Feb 13, 2006)

MooBella on-demand ice cream maker
(Mon Feb 13, 2006)

Configuring Apache for Maximum Performance
(Mon Feb 13, 2006)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author