# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Review: Aki is Frustratingly Peaceful
"Mahjong Solitaire is a very simple game. At the start of every level, you are presented with a board that contains a number of different tiles. On each tile is a symbol. To complete the level, you have to remove all pairs of tiles from the board in the allotted time by matching every tile on the board to another tile with the same symbol; removing a pair of tiles adds a little more time to the clock."
Story

( Permalink: Review: Aki is Frustratingly Peaceful      Submitted by Noel Wed Mar 17, 2004 )

Chkrootkit Portsentry Howto
Falko Timme has written a detailed tutorial on how to install chkrootkit and portsentry/logcheck on Unix systems in order to check a system for rootkits and be alerted in case of system attacks.

( Permalink: Chkrootkit Portsentry Howto      Submitted by Falko Timme Wed Mar 17, 2004 )

Creating secure backups with GnuPG
Learn how to transfer your GnuPG keys to the server, encrypt data and decrypt it after a download. Story

( Permalink: Creating secure backups with GnuPG      Submitted by LogError Wed Mar 17, 2004 )

What's Wrong with Eclipse Plugins
In theory, the plugin-architecture of the eclipse IDE is one of its strongest features, allowing it to leverage the effort of the entire developer base to extend the basic framework in an infinite number of ways. However, my personal experience with eclipse plugins has been one big disappointment. I have found plugins a hassle to install, a pain to maintain, and frustrating and unrewarding to use. While some of my frustrations have been due to problems of individual plugins, I believe that a constant source of irritation actually lies in the overall design of the eclipse plugin infrastructure. Read more here.

( Permalink: What's Wrong with Eclipse Plugins      Submitted by anonymous Wed Mar 17, 2004 )

Homemade Embedded BSD Systems
"Or, you can build a small firewall box yourself. While there are several alternatives for small, quiet systems, my favorites are the Soekris models. Soekris boxes are roughly the size of a paperback book, fanless, low-power, and designed specifically for open source operating systems. They're sold either as a plain board or mounted in a case."
Story

( Permalink: Homemade Embedded BSD Systems      Submitted by Noel Wed Mar 17, 2004 )

Emacs Remote Editing with Tramp
"What'd be really useful is an Emacs mode that makes accessing files using today's secure tools (like ssh and scp) both transparent and intuitive. Enter Tramp. Tramp stands for "Transparent Remote (file) Access, Multiple Protocol." It provides that transparent interface to remote filesystems that you've been craving. In fact, Tramp is so useful it's included in Emacs version 21.4 and later."
Story

( Permalink: Emacs Remote Editing with Tramp      Submitted by Noel Wed Mar 17, 2004 )

Constructing Red Hat Enterprise Linux v. 3
"Throughout this article, the focus is on how the release was put together. This article primarily discusses the development of the kernel used in Enterprise Linux v. 3. The kernel is only a fraction of an overall distribution, the portion that controls the underlying hardware and system resources. The challenges faced by the other teams, with projects such as compiler tools, the installer, hundreds of application packages, documentation and testing, are equally daunting. Each of these items was developed by gifted individuals."
Story

( Permalink: Constructing Red Hat Enterprise Linux v. 3      Submitted by Noel Wed Mar 17, 2004 )

Build a Life Science ID on Linux using Java
The amount of biological data being created today is mind-boggling. This article takes you through a step-by-step approach to building a Java based Life Sciences Identifier (LSID) authority from scratch. It demonstrates how to build this on a minimal data set and on data downloaded from the protein sequence database Swiss-Prot, all on the Linux platform.

( Permalink: Build a Life Science ID on Linux using Java      Submitted by Anonymous Tue Mar 16, 2004 )

Migrating apps to the 2.6 kernel and NPTL
"For most application developers, the majority of the changes made to the Linux kernel between the 2.4 and 2.6 kernel families have little direct impact. Most kernel changes only manifest themselves through increased system performance and capacity. Kernel and system changes that affect how applications spawn and manage other processes and threads are a significant exception to this rule. "
Story

( Permalink: Migrating apps to the 2.6 kernel and NPTL      Submitted by Noel Tue Mar 16, 2004 )

iStorm and iChalk v3.3
" is a one of a kind collaboration program which uses Rendezvous technology. Its sister product, iChalk, is the first internet enabled chalkboard. The new versions (v3.3) from Math Game House now allow text/caption in the shared chalkboard and include a web editor module with innovative archiving function."
Story

( Permalink: iStorm and iChalk v3.3      Submitted by Noel Tue Mar 16, 2004 )

It's a Bunch of Important Letters
"In 802.1X, the concept is that you have to log into a network, and until you do, the actual hardware device to which you're connecting -- whether it's a wireless base station or a wired Ethernet switch -- completely disables your connection's access to the rest of the network. When you login, you're connected just to the hub or base station, which passes on your login information to a server that has a database of users and their credentials (which can be password, digital certificates, or other methods of ensuring someone is who they say he or she is)."
Story

( Permalink: It's a Bunch of Important Letters      Submitted by Noel Tue Mar 16, 2004 )

1994 Interview with Linus, the Author of Linux
"What is your "best guess" of the number of machines runing Linux worldwide today and what would you base an estimate on.
Linus: I actually have no good idea at all: I haven't really followed either the CD-ROM sales or any ftp statistics, so it's rather hard to say. I guesstimate a user base of about 50,000 active users: that may be way off-base, but it doesn't sound too unlikely. ... and I saw a number like 10,000 CD-ROMs sold somewhere. (Today Linux Counter's current estimate is 18 million. Congrats Linus and thank you)"

Story

( Permalink: 1994 Interview with Linus, the Author of Linux      Submitted by Noel Tue Mar 16, 2004 )

Armoring Apache HTTP Server with SSL
"In symmetric cryptography, the same key is used to both encrypt and decrypt a message. This seems simple and straightforward; however, the complexity lies in how to transfer a key securely to your recipient. How do you know that someone won't intercept the key while it is being transferred? Common algorithms used for symmetric cryptography include DES, Triple-DES, and the RC2 algorithms."
Story

( Permalink: Armoring Apache HTTP Server with SSL      Submitted by Noel Tue Mar 16, 2004 )

Writing Portable Shell Scripts
"Shell scripts are a popular choice for writing small programs that do file manipulation. They are generally portable across platforms, but there are a number of things that can make a shell script work fine on one machine and fail on another. This article reviews some of the issues shell programmers may run into when trying to write widely portable scripts."
Story

( Permalink: Writing Portable Shell Scripts      Submitted by Noel Tue Mar 16, 2004 )

IPv6 transition-6to4 tunneling
Linux Gazette tells us about IPv6 transition-6to4 tunneling.
"6to4 gateway is the heart of the 6to4 tunneling mechanism. In the source side it receives IPv6 packet from the source IPv6 node or IPv6 relay gateway. It transfers this packet to the destination through IPv4 network by encapsulating this IPv6 packet inside an IPv4 packet. Now the encapsulated IPv6 packet is traveling in the IPv4 network and reaches the destination side 6to4 gateway. "

( Permalink: IPv6 transition-6to4 tunneling      Submitted by Noel Tue Mar 16, 2004 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Netli, Linux Take Web to Warp Speeds
(Mon Jul 14, 2003)

Create Debian Linux Packages
(Mon Jul 14, 2003)

Analysis: x86 Vs PPC
(Thu Jul 10, 2003)

OScon
(Thu Jul 10, 2003)

Yopy 3700
(Thu Jul 10, 2003)

Importing Data into MySQL
(Thu Jul 10, 2003)

Enterprise Directory Services and Linux
(Thu Jul 10, 2003)

OpenBSD Firewall
(Wed Jul 9, 2003)

The New Operating Systems Reality
(Wed Jul 9, 2003)

Software that makes you say Ahhhh!
(Wed Jul 9, 2003)

Torvalds on OSDL, 2.6, and the Future
(Wed Jul 9, 2003)

Linux and Open Source is Better for Business
(Tue Jul 8, 2003)

TextMaker
(Tue Jul 8, 2003)

Linux 2.6 Kernel
(Tue Jul 8, 2003)

The Author of Practical mod_perl
(Tue Jul 8, 2003)

Gal Duval and Mike Angelo Discuss HP & Mandrake
(Mon Jul 7, 2003)

Slackware Package Management, Part I
(Mon Jul 7, 2003)

Linux Wireless PDA Business Apps
(Mon Jul 7, 2003)

Kernel Rootkits Explained
(Mon Jul 7, 2003)

High-Impact Web Tier Clustering With JavaGroups
(Thu Jul 3, 2003)

Linux Access in State and Local Government
(Thu Jul 3, 2003)

Analysis: Open Source Databases
(Thu Jul 3, 2003)

Grid Computing: What are the Key Components?
(Wed Jul 2, 2003)

Sinbad Hears Linux's Siren Song
(Wed Jul 2, 2003)

Power Regexps
(Wed Jul 2, 2003)

Instant Messaging Clients
(Wed Jul 2, 2003)

Building A Home Network From Scratch
(Wed Jul 2, 2003)

Network Programming With the Twisted Framework
(Tue Jul 1, 2003)

Interview with Brian Hatch
(Tue Jul 1, 2003)

Summer GNATS Trouble
(Tue Jul 1, 2003)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author