# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Rexx for Everyone
It's easy to get lost in the world of "little languages" -- quite a few have been written to scratch some itch of a company, individual, or project. Rexx is one of these languages, with a long history of use on IBM operating systems, and good current implementations for Linux and other Free Software operating systems. Rexx occupies a useful ecological niche between the relative crudeness of shell scripting and the cumbersome formality of full systems languages. Many Linux programmers and systems administrators would benefit from adding a Rexx implementation to their collection of go-to tools.

( Permalink: Rexx for Everyone      Submitted by Anonymous Wed Feb 18, 2004 )

Using GnuPG, Part I
Linux Gazette tells us about using GnuPG.
"In today's world, communication has broken all previous time and distance limits. Now you can talk with someone in real-time no matter how far away he is. That advantage has also brought some major problems with itself. First, it is hard to verify other persons identity with 100% certainty and second, we can't know if there is a third party between who reads our correspondence. Fortunately for us something called public key cryptography was invented."

( Permalink: Using GnuPG, Part I      Submitted by Noel Tue Feb 17, 2004 )

Inside Scorched 3D
Linuxdevcenter tells us about Scorched 3D.
"Scorched 3D started as a 3D landscape generator. We gradually converted it into a game, which is why the first few versions have more graphics than gameplay. Originally, I toyed with making [the game setting] a small planet in space, eventually choosing instead to make it an island. The water element provides many gaming possibilities and restricts the graphical detail that needs to be drawn."

( Permalink: Inside Scorched 3D      Submitted by Noel Tue Feb 17, 2004 )

InfoSec in Campus and Open Environments
"Much of an information security professional’s job involves keeping outsiders away from the internal network. Much time and money is spent on firewalls and Intrusion Detection Systems to protect gateway machines. Physical security may also be taken care of with access cards and locked doors. This is all fine and good for corporate environments, but what about open environments like university campuses?" eBCVG

( Permalink: InfoSec in Campus and Open Environments      Submitted by Dr.T Tue Feb 17, 2004 )

Solaris 10
The Register reports on Solaris 10 and the revised Solaris TCP/IP stack.
"For the Unix SMP crowd, Sun has a host of new features, including containers, better diagnostic tools, and beefed up security. At the low-end, Sun is claiming it will soon provide evidence that Solaris 10 can outperform Linux when running standard Web and application server software - be it a one or four processor box."

( Permalink: Solaris 10      Submitted by Noel Tue Feb 17, 2004 )

Monitoring Net Traffic with OpenBSD's Packet Filte
Sys Admin Magazine tells us how to use OpenBSD's Packet Filter.
"Because the bandwidth costs me actual dollars for usage and over-usage, I needed to monitor how much is used, and by whom. This would be easy to solve if I controlled the upstream router for the box, but I don't. However, as I was setting up tighter security on my OpenBSD machine, I noticed that the Packet Filtering firewall software could give me statistics on named rules. By naming the rules that pass traffic, I could query the pf subsystem frequently and get traffic data. Problem solved!"

( Permalink: Monitoring Net Traffic with OpenBSD's Packet Filte      Submitted by Noel Tue Feb 17, 2004 )

Mepis Linux Founder Warren Woodford
Techdot talks to Warren Woodford, founder of Mepis Linux.
"For that amount of money, minus the upfront cost of installing MEPIS Linux, MEPIS or a MEPIS affiliate will retrain your workforce.  Or you can get some training from MEPIS and do the rest in-house.  Pick an office or a department, give us a pilot project and we'll prove it.  If we're right, you'll break even in the first year--and be a hero in your organization."

( Permalink: Mepis Linux Founder Warren Woodford      Submitted by Noel Tue Feb 17, 2004 )

Memory Hygiene in C and C++
Informit brings us: Memory Hygiene in C and C++: Safe Programming with Risky Data.
"In the abstract, the only things that can go wrong with C and C++ memory management are bad pointers and leaked memory. Pointers might be uninitialized; they might be incorrectly initialized (often to NULL); they might point to memory that's no longer safe to use; they might point to wrong data—frequently mistyped data."

( Permalink: Memory Hygiene in C and C++      Submitted by Noel Tue Feb 17, 2004 )

Touch Screen Voting Security
The Atlanta Journal-Constitution talks about touch-screen voting security in Georgia.
"The researchers concluded the system is vulnerable to attacks that use software programs designed to discreetly activate themselves and change election results. Also, Rubin said, blank smart cards could be bought and programmed by someone able to decipher the necessary computer language to make "homebrew" voter access cards. The privacy of the voting booth would allow someone to sneak in a stack of the homebrew cards and vote multiple times, he said."

( Permalink: Touch Screen Voting Security      Submitted by Noel Mon Feb 16, 2004 )

Migrating to the Linux 2.6 Kernel
Linux Devices walks us through migrating to Linux 2.6 kernel.
"Kernel configuration has changed for the better in the 2.6 Linux kernel. The new graphical configuration editors used by the 2.6 Linux kernel make it easier than ever before to reconfigure kernel compilation settings and identify the dependencies between different kernel configuration variables. Earlier 2.x-based kernels provided four basic kernel configuration editors:"

( Permalink: Migrating to the Linux 2.6 Kernel      Submitted by Noel Mon Feb 16, 2004 )

Safely Creating Temporary Files in Shell Scripts
Linux Security brings us: Safely Creating Temporary Files in Shell Scripts.
"This paper discusses how a programmer can write shell scripts that securely create temporary files in world/group writable directories. After explaining why it is important to be careful with temporary files I give some hints on how to identify and fix vulnerable shell scripts. This paper concentrates on how things are done. I intentionally leave out lots of gory details in order to make this document shorter and easier to understand for people that just want to write secure code with as little extra effort as possible."

( Permalink: Safely Creating Temporary Files in Shell Scripts      Submitted by Noel Mon Feb 16, 2004 )

Apache Keys and Certificates with mod_ssl
Builder.com tells us how to use mod_ssl.
"But you have some formidable resources at your disposal. With Apache's mod_ssl module, you have considerable power over your encryption/authentication implementation. Secure Sockets Layer (SSL), in its open protocol form (Transport Layer Security, or TLS), has what you need and, with mod_ssl, you can make it conform to your particular needs."

( Permalink: Apache Keys and Certificates with mod_ssl      Submitted by Noel Mon Feb 16, 2004 )

Cubicleware: Sun's JDS vs. Ximian XD2
Newsforge brings us: Cubicleware: Sun's JDS vs. Ximian XD2.
"Chris Gulker Sun JDS and Novell Ximian XD2 are not touted as general-purpose soup-to-nuts Linux distros. They are meant to be efficient and usable productivity desktops that can be quickly mastered by the non-technical workers who do the administrative heavy lifting in government offices, large universities, and in some big corporation settings. Both distros offer streamlined GNOME desktops with features reminiscent of recent versions of Windows that make it easy to find key applications like word processor and email client, and both attempt to mask large parts of the file system to make it easier for people to keep track of their files."

( Permalink: Cubicleware: Sun's JDS vs. Ximian XD2      Submitted by Noel Mon Feb 16, 2004 )

Writing man Pages
Linux.com takes us through creating man pages.
"Man pages are written in a markup language, generally referred to as nroff; in fact, there are other processors for it (such as troff or groff), but it's all the same language. Nroff is a markup language, but it's a bit more primitive than HTML or SGML. On the other hand, it's a macro language, so arbitrarily complex things can be done in it. There are sets of macros designed to support certain document types."

( Permalink: Writing man Pages      Submitted by Noel Mon Feb 16, 2004 )

Chrooting Apache and PHP in BSD
BSD Hound tells us how to chroot Apache and PHP under BSD.
"So why chroot instead of jail? Jailing processes is actually a simple task. Basically i want to help you out with 2 areas in this article. The first being to get apache and php chrooted while working with a chrooted mysql. And the second i hope you can figure out from this how to chroot your own processes. Once you figure out how to setup chroot trees configuring jails should not be a challenge for you at all"

( Permalink: Chrooting Apache and PHP in BSD      Submitted by Noel Sun Feb 15, 2004 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Scratching that Programming Itch
(Thu May 8, 2003)

Monkey Trouble
(Thu May 8, 2003)

Formatting and Reinstalling After a Security Incid
(Thu May 8, 2003)

Mandrake Linux 9.1 Retail Packs Available
(Wed May 7, 2003)

Linux's Perfect Storm
(Wed May 7, 2003)

Libranet 2.8
(Wed May 7, 2003)

SCO vs. IBM Lawsuit: SCO Has a Problem
(Wed May 7, 2003)

MySQL's David Axmark and Larry Stefonic
(Wed May 7, 2003)

Interview with the FreeBSD Core Team
(Tue May 6, 2003)

Apache Server 2.0
(Tue May 6, 2003)

IBM Files Answer to SCO's Caldera v IBM Complaint
(Tue May 6, 2003)

Sun's Vikas Deolaliker Reflects on Opteron/Win2k3
(Mon May 5, 2003)

Server Clinic: Put Virtual Filesystems to Work
(Mon May 5, 2003)

Exec Shield Overflow Protection
(Mon May 5, 2003)

Exult: The Open Age of Ultima
(Mon May 5, 2003)

A New Installation Paradigm
(Fri May 2, 2003)

Configuring a DHCP Server
(Fri May 2, 2003)

Fight Spam with SpamProbe
(Fri May 2, 2003)

SuSE 8.2 Approaches Computing Nirvana
(Fri May 2, 2003)

Honeypots: Simple, Cost-Effective Detection
(Fri May 2, 2003)

Guide To Using Snort For Basic Purposes
(Thu May 1, 2003)

If I Had My Own Distro...
(Thu May 1, 2003)

Taking Samba Beyond POSIX
(Thu May 1, 2003)

The Must-Fix List For 2.6.0
(Thu May 1, 2003)

Professional Apache Tomcat
(Wed Apr 30, 2003)

Introduction to Simple Oracle Auditing
(Wed Apr 30, 2003)

Electronic Archaeology
(Wed Apr 30, 2003)

Textmaker for Linux Reviewed
(Wed Apr 30, 2003)

SuSE 8.2 Pro Vs Red Hat Linux 9 in Desktop Usage
(Tue Apr 29, 2003)

Nicholas Petreley on Linux Developers
(Tue Apr 29, 2003)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author