# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Moodle: An open source learning management system
"Distance education is becoming more important in today's connected world. Universities and schools are supplementing traditional classroom-based learning with electronic learning management systems (LMS) -- software designed to deliver on-line education. You may know such software by other names, such as managed learning environments, virtual learning environments, or course management systems. Moodle is the definitive open source learning management system. Like most LMSes, it make extensive use of the Internet, with features such as discussion forums, chats, journals, automated testing and grading tools, and student tracking. Because it's open source, it's also broadly extensible by its large user community."

( Permalink: Moodle: An open source learning management system      Submitted by Noel Wed May 25, 2005 )

Motorola iPhone Demoed at the D
"Ed Zander of Motorola took the stage to show off a new Motorola phone running what Walt Mossberg described as "iTunes" and which Zander says will sync with iTunes. "

( Permalink: Motorola iPhone Demoed at the D      Submitted by Noel Wed May 25, 2005 )

Powermac G5s at the Show
"A pair of Apple Powermac G5 systems were actually running the Xbox 360 demos, not the 360 console. The consoles in the kiosks weren't actually running, they were just for show - now you know why all the controllers were wired."

( Permalink: Powermac G5s at the Show      Submitted by Noel Tue May 24, 2005 )

Secure and Private Browsing with Squid
Joe Topjian has written an article about secure and private browsing with Squid:
"Most public areas that allow access to the internet have absolutely no security in place. Need a good eye-opener? Next time you're at a public hotspot, take a copy of the dsniff tools. This article will show you a way to protect yourself from something like this -- in a way. This article will only show you how to protect your web traffic. If you still decide to talk to your CEO over AIM about some ultra-secret product coming out next week while waiting for your next flight, this won't save you. Squid can, of course, proxy requests for other applications besides HTTP, but HTTP is all I'll be covering. Maybe I'll go over other applictions in another article."

( Permalink: Secure and Private Browsing with Squid      Submitted by Falko Timme Tue May 24, 2005 )

HUMOR: Linux Can Make You Cool
Getting into Linux, setting up web servers and tinkering with configurations doesn't just satisfy an insatiable desire you and I have to create and achieve, it also makes you cool. Read the brief article here.

( Permalink: HUMOR: Linux Can Make You Cool      Submitted by Mark Rais Tue May 24, 2005 )

How LDAP works best with J2EE and EJBs
Here's a real good series of articles recently published, that explores LDAP (Lightweight Directory Access Protocol) Enterprise Application Programming. Part 1 provides a guide to learning the basics of Java LDAP programming and gives you a working knowledge of LDAP. Part 2 shows you how to setup LDAP for an Application Server. Part 3 provides details on how to use LDAP authentication in your J2EE Application Server application. Part 4 teaches you EJB Programming with LDAP and roles for security and their underlying LDAP groups. In Part 5 learn EJB Programming using Methods, Instance Level Security and LDAP.

( Permalink: How LDAP works best with J2EE and EJBs      Submitted by Anonymous Tue May 24, 2005 )

Application optimization with compilers for Linux
Interested in tuning your C/C++ applications for Linux on POWER? This article compares the optimization options for both Linux on POWER C/C++ compilers: GCC and IBM XL C/C++. This paper also reviews tactics, such as Interprocedural Analysis, Profile Directed Feedback, and High Order Transformations, which are used by one or both of the compilers to extract higher performance from the Power architecture.

( Permalink: Application optimization with compilers for Linux      Submitted by Anonymous Tue May 24, 2005 )

JAXP makes XML manageable for Java
Java technology and XML are arguably the most important programming developments of the last five years. The Java API for XML Processing (JAXP) lets you validate, parse, and transform XML using several different APIs. JAXP provides both ease of use and vendor neutrality. This article shows you how to take advantage of the API's parsing and validation features.

( Permalink: JAXP makes XML manageable for Java      Submitted by Anonymous Tue May 24, 2005 )

An Introduction to Tiger Terminal
"OS X revolutionized the Mac by building an elegant GUI over a BSD kernel. Most users didn't much care about the inherent security and stability of the UNIX foundation, but experienced UNIX users recognized the power underneath the Aqua interface. This article will introduce you to some of the power the built-in Terminal app and command-line interface (CLI) can unleash for Tiger users."

( Permalink: An Introduction to Tiger Terminal      Submitted by Noel Mon May 23, 2005 )

MySQL Tips
MySQL tips on how to find out who is doing what in MySQL, and how to kill the process. Plus, learn how to create binary log files to log everything. There are other examples as well, including one on spatial extensions.

( Permalink: MySQL Tips      Submitted by Mike Chirico Mon May 23, 2005 )

OpenBSD 3.7: The Wizard of OS
"Today the OpenBSD project announced the new 3.7 release. This is the first release to support newer wireless chipsets, especially for 802.11g, thanks to a big activism campaign lead by project leader Theo de Raadt. It's now possible to create a portable access point with a tiny PDA using the Zaurus port, too. As usual, there are a lot of other big and small changes, such as the import of Xorg, the jump towards gcc3, and a feature to update your installed packages automagically. Discover the details behind the scenes in this interview that Federico Biancuzzi had with several OpenBSD developers."

( Permalink: OpenBSD 3.7: The Wizard of OS      Submitted by Noel Mon May 23, 2005 )

Mozilla and Firefox Flaws
In this weeks Security Alerts, we look at problems in gzip, Mozilla and Firefox, OpenOffice.org, the FreeBSD kernel, Ethereal, TCPDump, libTIFF, Smail, Apache2's htdigest, and SCO UnixWare's chroot.

( Permalink: Mozilla and Firefox Flaws      Submitted by Noel Mon May 23, 2005 )

Interview with Will Stephenson
"My name is Will Stephenson, I'm 30, and from Newcastle upon Tyne, UK. However, I've just moved to Nuremberg, Germany. I've been contributing for KDE for 3-4 years, most of my early stuff was things like icons and animations though. I started out contributing to Kopete, icons, animations, artwork etcetera, then I coded a couple of plugins. Then I went to Kastle and got really hooked and coded KIMProxy, which brought me into contact with other KDE applications, mostly KDEPIM. Do you know about KIMProxy?"

( Permalink: Interview with Will Stephenson      Submitted by Noel Mon May 23, 2005 )

What the Linux Desktop Needs
When developing software, utilizing techniques that save time and give maximum results are always beneficial. The same is true if the software we develop is meant to empower its users to do the same. Kurt Pfeifle submitted the following editorial to osOpinion/osViews which illustrates that ISVs shouldnt have to provide 16 different distro/version packages for their application to deploy software on Linux, yet this is becoming commonplace.

( Permalink: What the Linux Desktop Needs      Submitted by Kelly McNeill Mon May 23, 2005 )

Interview With KDE-PIM Hacker Till Adam
"Till Adam only started hacking on the KDE mail client, KMail, because he wanted some features implemented from the command-line client Mutt. Now he is one of the main developers of the KDE-PIM project, which KMail is part of. KDE Dot News caught up with Till to talk about e-mail protocols, groupware and implementing them in KDE. "

( Permalink: Interview With KDE-PIM Hacker Till Adam      Submitted by Noel Fri May 20, 2005 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

KDE tips and tricks
(Wed Feb 2, 2005)

The Weakest Link
(Wed Feb 2, 2005)

The social structure of open source development
(Wed Feb 2, 2005)

Linux Client Migration Cookbook
(Wed Feb 2, 2005)

Soccer-playing robot
(Tue Feb 1, 2005)

Roaming charges: Blown by the winds of change
(Tue Feb 1, 2005)

Remote access with FreeNX in 5 steps
(Tue Feb 1, 2005)

What powers your university, Solaris or Linux?
(Mon Jan 31, 2005)

Some Linux apps are small wonders
(Mon Jan 31, 2005)

Gnoppix 0.9.9b1
(Mon Jan 31, 2005)

Managing Projects with GNU Make, 3rd Edition.
(Sun Jan 30, 2005)

The Big Kolab Kontact Interview
(Sun Jan 30, 2005)

Tracking your GRAMPS
(Sat Jan 29, 2005)

Introducing Ardour
(Sat Jan 29, 2005)

Running Wine on the Sun Java Desktop
(Sat Jan 29, 2005)

Scripting a Binary Tree Using Tcl
(Sat Jan 29, 2005)

An Interview with Vladimir Sokolov of EMS
(Fri Jan 28, 2005)

A house divided: UWB's double standards
(Fri Jan 28, 2005)

Creating EJB clients using the Eclipse Rich Client
(Fri Jan 28, 2005)

Arch Linux 0.7 Review
(Fri Jan 28, 2005)

The role of JNDI in J2EE
(Thu Jan 27, 2005)

Develop Apache Derby applications in Eclipse
(Thu Jan 27, 2005)

Pyrex extends and speeds Python apps
(Thu Jan 27, 2005)

Sun prepares for OpenSolaris
(Thu Jan 27, 2005)

Tool of the Month: FreeBSD tools
(Wed Jan 26, 2005)

Timothy Miller and the Open Graphics Project
(Wed Jan 26, 2005)

Build a push proxy gateway on Linux
(Wed Jan 26, 2005)

A great desktop OS: Fedora Core 3
(Wed Jan 26, 2005)

Robert Drost - Innovator
(Tue Jan 25, 2005)

Preparing yourself for intrusions
(Tue Jan 25, 2005)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author