|"Mahjong Solitaire is a very simple game. At the start of every level, you are presented with a board that contains a number of different tiles. On each tile is a symbol. To complete the level, you have to remove all pairs of tiles from the board in the allotted time by matching every tile on the board to another tile with the same symbol; removing a pair of tiles adds a little more time to the clock." |
( Permalink: Review: Aki is Frustratingly Peaceful Submitted by Noel Wed Mar 17, 2004 )
|Chkrootkit Portsentry Howto|
|Falko Timme has written a detailed tutorial on how to install chkrootkit and portsentry/logcheck on Unix systems in order to check a system for rootkits and be alerted in case of system attacks.
( Permalink: Chkrootkit Portsentry Howto Submitted by Falko Timme Wed Mar 17, 2004 )
|Creating secure backups with GnuPG|
|Learn how to transfer your GnuPG keys to the server, encrypt data and decrypt it after a download.
( Permalink: Creating secure backups with GnuPG Submitted by LogError Wed Mar 17, 2004 )
|What's Wrong with Eclipse Plugins|
|In theory, the plugin-architecture of the eclipse IDE is one of its strongest features, allowing it to leverage the effort of the entire developer base to extend the basic framework in an infinite number of ways. However, my personal experience with eclipse plugins has been one big disappointment. I have found plugins a hassle to install, a pain to maintain, and frustrating and unrewarding to use. While some of my frustrations have been due to problems of individual plugins, I believe that a constant source of irritation actually lies in the overall design of the eclipse plugin infrastructure. Read more here.|
( Permalink: What's Wrong with Eclipse Plugins Submitted by anonymous Wed Mar 17, 2004 )
|Homemade Embedded BSD Systems|
|"Or, you can build a small firewall box yourself. While there are several alternatives for small, quiet systems, my favorites are the Soekris models. Soekris boxes are roughly the size of a paperback book, fanless, low-power, and designed specifically for open source operating systems. They're sold either as a plain board or mounted in a case." |
( Permalink: Homemade Embedded BSD Systems Submitted by Noel Wed Mar 17, 2004 )
|Emacs Remote Editing with Tramp|
|"What'd be really useful is an Emacs mode that makes accessing files using today's secure tools (like ssh and scp) both transparent and intuitive. Enter Tramp. Tramp stands for "Transparent Remote (file) Access, Multiple Protocol." It provides that transparent interface to remote filesystems that you've been craving. In fact, Tramp is so useful it's included in Emacs version 21.4 and later." |
( Permalink: Emacs Remote Editing with Tramp Submitted by Noel Wed Mar 17, 2004 )
|Constructing Red Hat Enterprise Linux v. 3|
|"Throughout this article, the focus is on how the release was put together. This article primarily discusses the development of the kernel used in Enterprise Linux v. 3. The kernel is only a fraction of an overall distribution, the portion that controls the underlying hardware and system resources. The challenges faced by the other teams, with projects such as compiler tools, the installer, hundreds of application packages, documentation and testing, are equally daunting. Each of these items was developed by gifted individuals." |
( Permalink: Constructing Red Hat Enterprise Linux v. 3 Submitted by Noel Wed Mar 17, 2004 )
|Build a Life Science ID on Linux using Java|
|The amount of biological data being created today is mind-boggling. This article takes you through a step-by-step approach to building a Java based Life Sciences Identifier (LSID) authority from scratch. It demonstrates how to build this on a minimal data set and on data downloaded from the protein sequence database Swiss-Prot, all on the Linux platform.|
( Permalink: Build a Life Science ID on Linux using Java Submitted by Anonymous Tue Mar 16, 2004 )
|Migrating apps to the 2.6 kernel and NPTL|
|"For most application developers, the majority of the changes made to the Linux kernel between the 2.4 and 2.6 kernel families have little direct impact. Most kernel changes only manifest themselves through increased system performance and capacity. Kernel and system changes that affect how applications spawn and manage other processes and threads are a significant exception to this rule.
( Permalink: Migrating apps to the 2.6 kernel and NPTL Submitted by Noel Tue Mar 16, 2004 )
|iStorm and iChalk v3.3|
|" is a one of a kind collaboration program which uses Rendezvous technology. Its sister product, iChalk, is the first internet enabled chalkboard. The new versions (v3.3) from Math Game House now allow text/caption in the shared chalkboard and include a web editor module with innovative archiving function." |
( Permalink: iStorm and iChalk v3.3 Submitted by Noel Tue Mar 16, 2004 )
|It's a Bunch of Important Letters|
|"In 802.1X, the concept is that you have to log into a network, and until you do, the actual hardware device to which you're connecting -- whether it's a wireless base station or a wired Ethernet switch -- completely disables your connection's access to the rest of the network. When you login, you're connected just to the hub or base station, which passes on your login information to a server that has a database of users and their credentials (which can be password, digital certificates, or other methods of ensuring someone is who they say he or she is)." |
( Permalink: It's a Bunch of Important Letters Submitted by Noel Tue Mar 16, 2004 )
|1994 Interview with Linus, the Author of Linux|
|"What is your "best guess" of the number of machines runing Linux worldwide today and what would you base an estimate on.|
Linus: I actually have no good idea at all: I haven't really followed either the CD-ROM sales or any ftp statistics, so it's rather hard to say. I guesstimate a user base of about 50,000 active users: that may be way off-base, but it doesn't sound too unlikely. ... and I saw a number like 10,000 CD-ROMs sold somewhere. (Today Linux Counter's current estimate is 18 million. Congrats Linus and thank you)"
( Permalink: 1994 Interview with Linus, the Author of Linux Submitted by Noel Tue Mar 16, 2004 )
|Armoring Apache HTTP Server with SSL|
|"In symmetric cryptography, the same key is used to both encrypt and decrypt a message. This seems simple and straightforward; however, the complexity lies in how to transfer a key securely to your recipient. How do you know that someone won't intercept the key while it is being transferred? Common algorithms used for symmetric cryptography include DES, Triple-DES, and the RC2 algorithms." |
( Permalink: Armoring Apache HTTP Server with SSL Submitted by Noel Tue Mar 16, 2004 )
|Writing Portable Shell Scripts|
|"Shell scripts are a popular choice for writing small programs that do file manipulation. They are generally portable across platforms, but there are a number of things that can make a shell script work fine on one machine and fail on another. This article reviews some of the issues shell programmers may run into when trying to write widely portable scripts." |
( Permalink: Writing Portable Shell Scripts Submitted by Noel Tue Mar 16, 2004 )
|IPv6 transition-6to4 tunneling|
|Linux Gazette tells us about IPv6 transition-6to4 tunneling.
"6to4 gateway is the heart of the 6to4 tunneling mechanism. In the source side it receives IPv6 packet from the source IPv6 node or IPv6 relay gateway. It transfers this packet to the destination through IPv4 network by encapsulating this IPv6 packet inside an IPv4 packet. Now the encapsulated IPv6 packet is traveling in the IPv4 network and reaches the destination side 6to4 gateway. "
( Permalink: IPv6 transition-6to4 tunneling Submitted by Noel Tue Mar 16, 2004 )