# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Current Mozilla Foundation Projects
"All I can say is, I'm impressed, very impressed. ThunderBird is basically an off-shoot of Mozilla's email core, but it's beautiful in look and feel. It runs smoothly, and the feel is very familiar. In fact, it's amazingly similar to Outlook Express. ThunderBird has a Spam detection system which is very similar to Mail.app and just as effective."

( Permalink: Current Mozilla Foundation Projects      Submitted by Noel Tue Apr 6, 2004 )

Mac OS X Panther Killer Tips Book
"I just picked up Scott Kelby's Mac OS X Panther Killer Tips for something to read. All said and done, it didn't offer a whole lot to me, but then again, I am a long term computer user and tend to keep up on tips, tricks, hacks and hints for the various systems I use. For the average, non-geek/non-power user, this book contains a plethora of tips that they may find of use. However, one tip in particular never should have gotten by the technical editor."

( Permalink: Mac OS X Panther Killer Tips Book      Submitted by Noel Tue Apr 6, 2004 )

Possio's PX30 hackable wireless router
"The PX30 is delivered as a complete system, including a plastic enclosure, pre-configured Linux OS, and IBM Java virtual machine and OSGi Service Platform. It supports 802.11b and Bluetooth wireless networks, and is "ready to run" out of the box as a Java programmable wireless router that can be configured through a Web interface or controlled by OSGi device management software, according to Possio CTO Ulf Söderberg. "

( Permalink: Possio's PX30 hackable wireless router      Submitted by Noel Tue Apr 6, 2004 )

Running BIND9 in a chroot cage using NetBSD 1.6.2
With NetBSD 1.6.2, the named user exists and chroot environment is almost completely setup for us. Now, we must add a couple of files. In the chroot cage, the named user will need access to the device files null and random. As the parameters passed to `mknod' for some devices have changed over time, view /dev/MAKEDEV to find the correct major and minor device number.

( Permalink: Running BIND9 in a chroot cage using NetBSD 1.6.2      Submitted by Tim Roden Tue Apr 6, 2004 )

Analyzing PostgreSQL SQL usage
Everyone wants their database-backed web application to run faster on the same hardware - if a software tweak can postpone a hardware upgrade for a year, it's usually well worth it. One way to improve performance is to examine how the application is interacting with the database, and see if there is anything that we can do to speed things up. We will take a look at a handy script that can examine PostgreSQL logs and let you know what queries are getting run the most. Story.

( Permalink: Analyzing PostgreSQL SQL usage      Submitted by tcopeland Tue Apr 6, 2004 )

Review - Building Wireless Community Networks 2/e
Nowadays, with Wireless enabled computers almost as common as Ethernet, it makes sense to more people and organizations to make the next step and connect their networks using wireless technology. If you or your community is planning to get online using wireless network technology, Flickenger’s book “Building Wireless Community Networks” is exactly where you need to start. eBCVG

( Permalink: Review - Building Wireless Community Networks 2/e      Submitted by Dr.T Tue Apr 6, 2004 )

The future of phishing
This article examines how attackers are likely to respond to the current move towards 2-factor authentication as a defence against phishing scams, and describes an alternative approach, available today, that provides a longer-term solution. Story

( Permalink: The future of phishing      Submitted by LogError Tue Apr 6, 2004 )

The Standard Template Library
"Have you ever found yourself in a situation where you had to ensure that only one copy of a program could be running at any given time? If so, you probably thought it would be nice if the program could detect the presence of another copy of itself and exit gracefully. If you have faced this problem, read on to see how I solved it."

( Permalink: The Standard Template Library      Submitted by Noel Tue Apr 6, 2004 )

Complete Mac Security
This third article in the Complete Mac Security series expands upon the first and second installments. We've already covered physical security, Open Firmware, LoginWindow, Fast User Switching, and Screen Effects, and how they can be used to secure your Mac. This installment will focus on file security and encryption.

( Permalink: Complete Mac Security      Submitted by Noel Mon Apr 5, 2004 )

Web Accessibility
"Don’t be put off by all these different variants and their sometimes-dramatic results. Any problems that a colorblind user may encounter with your Web site are often due to matters of contrast and distinguishability, which we’ll also address when we’re thinking about people with poor vision. So hold that thought; we’ll get to it in a little while."

( Permalink: Web Accessibility      Submitted by Noel Mon Apr 5, 2004 )

Chrooting daemons and system processes
"The idea behind chroot is fairly simple. When you run BIND (or any other process) in a chroot jail, the process is simply unable to see any part of the filesystem outside the jail. For example, in this document, we'll set BIND up to run chrooted to the directory /chroot/named. Well, to BIND, the contents of this directory will appear to be /, the root directory. Nothing outside this directory will be accessible to it. You've probably encounted a chroot jail before, if you've ever ftped into a public system. "

( Permalink: Chrooting daemons and system processes      Submitted by Noel Mon Apr 5, 2004 )

IT in a Box ably serves small business needs
"Under the covers, the IT-100 comprises a 533MHz Crusoe CPU, 128MB RAM, 20GB hard drive, a four-port 10/100 Ethernet switch, and an 802.11b wireless access point. EmergeCore's CoreVista operating system is based on the Linux Slackware distribution."

( Permalink: IT in a Box ably serves small business needs      Submitted by Noel Mon Apr 5, 2004 )

Keeping Fedora Up to Date with Yum
"Yum is an automatic updater and package management tool for rpm based systems. Yum automatically computes dependencies and figures out what steps need to occur in order to install packages. It makes it much easier to maintain groups of machines without having to manually update each one using rpm. "

( Permalink: Keeping Fedora Up to Date with Yum      Submitted by Noel Mon Apr 5, 2004 )

Migrating from Windows to Linux
"Slow down... take a deep breath, because you have a lot of work ahead of you. Millions of people have made the same switch before you, so it's not impossible. We are going to take you step-by-step through a whole migration from Windows to Linux, covering everything from picking the right Linux distribution to installing Linux applications."

( Permalink: Migrating from Windows to Linux      Submitted by Noel Mon Apr 5, 2004 )

WordPerfect 8 for Linux
"Now, the only thing Corel needs to do is make this usable version of an old friend available to the public. Even without new features, WP8 still is the only Linux word processor with make-it-fit capabilities. And experienced WP users make good use of its easy-to-create macros. It is hard to see how Corel could test the market interest in this spruced-up version of an old favorite without telling anyone."

( Permalink: WordPerfect 8 for Linux      Submitted by Noel Mon Apr 5, 2004 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Sendmail Trouble
(Thu Sep 25, 2003)

Moving to Linux
(Thu Sep 25, 2003)

Source Based Distributions
(Wed Sep 24, 2003)

KernelTrap Interview With Rusty Russell
(Wed Sep 24, 2003)

Towards Linux 2.6
(Wed Sep 24, 2003)

Linux HOWTO: Read and Write in Hindi
(Tue Sep 23, 2003)

Linux on the AMD Opteron: Are We Ready?
(Tue Sep 23, 2003)

Authenticating LinuxWith IBM Directory Server
(Tue Sep 23, 2003)

A Newbie's Guide to Setting up PF on OpenBSD 3.x
(Tue Sep 23, 2003)

Measuring Linux Scheduler Improvements
(Mon Sep 22, 2003)

Groklaw Responds to Darl McBride's Open Letter
(Mon Sep 22, 2003)

Book Review: Managing Linux Systems with Webmin
(Mon Sep 22, 2003)

Software Review: djbdns
(Mon Sep 22, 2003)

Boot Linux Faster
(Mon Sep 22, 2003)

Network Programming With the Twisted Framework
(Sun Sep 21, 2003)

Review - Red Hat Linux Administration
(Sat Sep 20, 2003)

Sun the Dell of Enterprise Software?
(Fri Sep 19, 2003)

Fine-Tuning Linux Administration with ACLs
(Fri Sep 19, 2003)

SuSE Linux Professional 8.2 Review
(Fri Sep 19, 2003)

Mohammed J. Kabir
(Thu Sep 18, 2003)

Dreamworks Gets Creative With Linux
(Thu Sep 18, 2003)

Exclusive Interview with Jon Danzig
(Thu Sep 18, 2003)

Creating Kparts Componets for KDE
(Wed Sep 17, 2003)

Java Desktop System
(Wed Sep 17, 2003)

Tilting at Windmills: A Response to Rob Enderle
(Wed Sep 17, 2003)

Today_is.pl and holidays.awk
(Tue Sep 16, 2003)

Encrypted Email Cookbook
(Tue Sep 16, 2003)

Dynamic Honeypots
(Tue Sep 16, 2003)

Open Source Wireless Tools
(Mon Sep 15, 2003)

Book Review - Linux Server Hacks
(Mon Sep 15, 2003)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author