# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Flash Archives in Solaris
"Generic disaster recovery preparation for the UNIX platform includes maintaining the server's configuration details. For example, in the system information, you need to keep a hard copy of the method you are using for backup and restore. If you use ufsdump to back up the OS to locally attached tape drives, the information to keep includes all the backup file systems, the order of the file systems backed up, as well as information about the backup tape, OS level, patch level, disk partitions, file system layout, the third-party drivers, and so on."

( Permalink: Flash Archives in Solaris      Submitted by Noel Tue Jun 7, 2005 )

Apple rumored to announce switch to Intel at WWDC
"A report at News.com lends credence to the rumor last month in the Wall Street Journal that Apple was in talks with Intel to replace IBM's PowerPC to power their personal computers. Such a move would have significant hurdles as far as both software vendors as well as the current user base, and some analysts suspected the talks were intended as a bargaining item with IBM, which has had problems with chip supply as well as developing a G5 suitable for a laptop. However the current News.com report suggests that an official announcement may come as soon as Monday at Apple's Worldwide Developer Conference (WWDC). "

( Permalink: Apple rumored to announce switch to Intel at WWDC      Submitted by Noel Mon Jun 6, 2005 )

DenyHosts, an SSH Server Attack Denial Tool
Every once in a great while I run across a very useful tool whose simplicity amazes me. One of those tools recently hit my radar after I noticed several failed SSH login attempts to my machine. Apparently someone had plenty of time to try to login, and was not deterred by repeated login failure. That set me on a course to find a solution that was simple, effective and enough of a barrier to the attacker that they would move on out of frustration, or simply be denied enough that they would find easier targets.

( Permalink: DenyHosts, an SSH Server Attack Denial Tool      Submitted by Chuck Talk Mon Jun 6, 2005 )

Beginner's Introduction to the KDE Desktop
This introductory article provides an overview of the KDE interface and tips on basic configuration to share with hesitant friends.
It's part of our "Windows to Linux" series and helps make those first few steps into the KDE desktop world as easy as possible. I've noticed that more and more new users of KDE are non-techies who need a quick introduction to this extensive and powerful desktop.
Complete article

( Permalink: Beginner's Introduction to the KDE Desktop      Submitted by Andrea W. Cordingly Mon Jun 6, 2005 )

Knoppix 3.9 Review
Knoppix 3.9 has hit the streets a couple of days ago. It bundles all its usual goodies plus a few nice updates. On the positive side, OpenOffice has been updated to its latest beta version and KDE version 3.4.0 is included (yeah, I know that KDE 3.4.1 just came out with a few critical bugfixes at about the same time that Knoppix was released). The kernel is now 2.6.11 (the latest stable release). All the other packages has been updates from the latest Debian/sid distribution.
See Article

( Permalink: Knoppix 3.9 Review      Submitted by Flavio Villanustre Mon Jun 6, 2005 )

LinuxFest Northwest 2005: Wrap-Up Report
"LinuxFest Northwest is a non-commercial one-day conference and exhibition of open-source technology with an emphasis on Linux. It is held in the city of Bellingham, Washington, which is about 90 miles north of Seattle and about 20 miles south of the Canadian border. It is run by the Bellingham Linux Users Group (BLUG) with the help of other users groups. Admission is free and open to all."

( Permalink: LinuxFest Northwest 2005: Wrap-Up Report      Submitted by Noel Mon Jun 6, 2005 )

Lucane groupware quick start guide
Lucane is an open source groupware solution that doesn’t require remarkable installation and configuration time. It is simple to use and has a modular architecture including all needed groupware modules like email-client, instant messaging, shared folders, calendar, white board, forums and more.
Read more at Linux-Tip.net

( Permalink: Lucane groupware quick start guide      Submitted by fn-eagle Mon Jun 6, 2005 )

A good morning with: Theo de Raadt
Everybody know that you're the OpenBSD and OpenSSH GURU and creator, one of most famous and used secure operating system nowaday. Why you created them? What did you need many years ago from os world when you created OpenBSD? What inspired you to write from scratch OpenBSD and OpenSSH?
I started working on OpenBSD, and many earlier projects, because I have always felt that vendor systems were not designed for quality. The primary goal of a vendor is to make money. In some industry markets, high quality can be tied to making more money, but I am sure by now all of us know the computer industry is not like that.

( Permalink: A good morning with: Theo de Raadt      Submitted by Vincenzo Ciaglia Fri Jun 3, 2005 )

Build a Perl/CGI voting system
Many Web-deployed applications are written within elaborate database-driven server-side development frameworks such as PHP and Java servlets, but for simple applications (for example, where the entire dataset fits comfortably within a Web server's RAM), data persistence can be easily accomplished using locked DBM files in conjunction with the Perl MLDBM module. This article presents a real-world example -- a Web-based voting application -- that highlights the use of minimal external modules, forgoes using client-based cookies, and takes advantage of CGI attributes.

( Permalink: Build a Perl/CGI voting system      Submitted by Anonymous Fri Jun 3, 2005 )

Bluetooth Security Review
"Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables and connectors. It is supported and used in products by over 3000 companies, including large corporations such as Sony Ericsson, Nokia, Motorola, Intel, IBM, Toshiba, Motorola, Apple, Microsoft, and even Toyota, Lexus and BMW. A variety of products available on the market have short range Bluetooth radios installed, including printers, laptops, keyboards, cars and the most popular type of Bluetooth enabled devices - mobile phones, driving 60% of the Bluetooth market. "

( Permalink: Bluetooth Security Review      Submitted by Noel Fri Jun 3, 2005 )

CPU Socket Basics
"Although there are currently only two main players in the CPU market, AMD and Intel, the number of choices is still enough to make the typical consumer's head spin. Each manufacturer has a few different models to promote, and many of these models can be found in a few different form factors (namely, the "sockets" to which they connect) that exclude interchangeability. This two-part series of Tech Tips will look at a few details of each of the currently-supported CPU (Central Processing Unit) sockets and how they are all similar and different from one to another. First up, we will take a look at the CPU sockets supporting modern Intel processors."

( Permalink: CPU Socket Basics      Submitted by Noel Fri Jun 3, 2005 )

Remove insecure root grace period from sudo
"Unfortunately, sudo includes a grace period, wherein it will allow you to run privileged tasks repeatedly without a password. "

( Permalink: Remove insecure root grace period from sudo      Submitted by Noel Fri Jun 3, 2005 )

Everything About Safari RSS, Part 1
"Over these next few installments, I'm going to show you (well, try to show you) what can and cannot be done with Safari RSS, what to expect from it, and how to take these capabilities as far as possible so that your foray into the world of RSS (or browser-based RSS, anyway) goes as smoothly as possible. Before starting, though, I ask that you take a few minutes to think about the number of things one can potentially do with HTML and RSS. The Safari engineers without doubt had to make choices, settle on a "vision" of how RSS would be used, and stay true to it while writing the application, so that it didn't turn into a soupy mess. This is what they have done, and I have found it is key to try to "get into the spirit," so to speak, before starting to work and evaluate Safari RSS. Only then can one appreciate the effort that went into it and decide whether it is the right application or not."

( Permalink: Everything About Safari RSS, Part 1      Submitted by Noel Thu Jun 2, 2005 )

Why Your Security Investigation Is Going To Fail
"What would normally take an ASE certified mechanic an hour to do turns into several days for Joe Schmo. That water pump IS going to come off, whether it likes it or not. After about 5 days, Joe gives up on the water pump and decides that the car isn't that important anyway. He pulls the car into the backyard, puts a TV and a few plants on the hood, and whistles while he walks back into the house.
Nothing to see here, just move along.
And so goes the great majority of internal security investigations in today's corporate world. "


( Permalink: Why Your Security Investigation Is Going To Fail      Submitted by Noel Thu Jun 2, 2005 )

Virtualization and emulation
Virtualization is a technique that provides the ability to partition hardware in a way that allows more than one operating system to run simultaneously. Each instance of the Operating System and its applications run on the native hardware (instructions are executed natively by the CPU). In contrast, emulators model a CPU and other subsystems in software so that the actual hardware only runs one instance of the Operating System and the emulator itself.
See Article

( Permalink: Virtualization and emulation      Submitted by Flavio Villanustre Thu Jun 2, 2005 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

KBear - App of the Month
(Tue Feb 15, 2005)

Defeat the no match found scenario
(Tue Feb 15, 2005)

One week with Gentoo Linux
(Tue Feb 15, 2005)

Perl Trouble
(Mon Feb 14, 2005)

The CELL Microprocessor
(Mon Feb 14, 2005)

Connecting to the Internet with Kppp
(Mon Feb 14, 2005)

Fear and Loathing in Information Security
(Mon Feb 14, 2005)

XAMPP, an Apache Distribution
(Sat Feb 12, 2005)

SCO Hometown Declares State of Emergency
(Sat Feb 12, 2005)

Anatomy of the Linux boot process
(Sat Feb 12, 2005)

Migrate Win32 C/C++ application to Linux on POWER
(Sat Feb 12, 2005)

Matthias Ettrich
(Fri Feb 11, 2005)

Entering non ascii text in X windows
(Fri Feb 11, 2005)

Review: CentOS - A Decent RHEL alternative
(Fri Feb 11, 2005)

Data alignment: Straighten up and fly right
(Fri Feb 11, 2005)

Interview with Author Christopher Negus
(Fri Feb 11, 2005)

AOP tools comparison
(Fri Feb 11, 2005)

Programming Tools: Refactoring
(Thu Feb 10, 2005)

A Fireside Chat on KDE Usability
(Thu Feb 10, 2005)

Easy persistence layers for J2EE apps with iBATIS
(Thu Feb 10, 2005)

Using MySQL to benchmark OS performance
(Wed Feb 9, 2005)

The Big Kolab Kontact Interview - Part II
(Wed Feb 9, 2005)

Linux laptops: Finding the right one for me.
(Wed Feb 9, 2005)

Arch In Depth
(Wed Feb 9, 2005)

Cooling Down Hot Processors
(Wed Feb 9, 2005)

Debian Bind-Chroot-Howto
(Tue Feb 8, 2005)

KNetStats : KDE System Tray Network Monitor
(Tue Feb 8, 2005)

The Cranky User: Performance Anxiety
(Tue Feb 8, 2005)

Plug memory leaks with Rational Purify for Linux
(Tue Feb 8, 2005)

A Temporary Internet Lounge Revisited
(Mon Feb 7, 2005)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author