|It's easy to get lost in the world of "little languages" -- quite a few have been written to scratch some itch of a company, individual, or project. Rexx is one of these languages, with a long history of use on IBM operating systems, and good current implementations for Linux and other Free Software operating systems. Rexx occupies a useful ecological niche between the relative crudeness of shell scripting and the cumbersome formality of full systems languages. Many Linux programmers and systems administrators would benefit from adding a Rexx implementation to their collection of go-to tools.|
( Permalink: Rexx for Everyone Submitted by Anonymous Wed Feb 18, 2004 )
|Using GnuPG, Part I|
|Linux Gazette tells us about using GnuPG.
"In today's world, communication has broken all previous time and distance limits. Now you can talk with someone in
real-time no matter how far away he is. That advantage has also brought some major problems with itself. First, it is hard to verify other persons identity with 100% certainty and second, we can't know if there is a third party between who reads our correspondence. Fortunately for us something called public key cryptography was invented."
( Permalink: Using GnuPG, Part I Submitted by Noel Tue Feb 17, 2004 )
|Inside Scorched 3D|
|Linuxdevcenter tells us about Scorched 3D.
"Scorched 3D started as a 3D landscape generator. We gradually converted it into a game, which is why the first few versions have more graphics than gameplay. Originally, I toyed with making [the game setting] a small planet in space, eventually choosing instead to make it an island. The water element provides many gaming possibilities and restricts the graphical detail that needs to be drawn."
( Permalink: Inside Scorched 3D Submitted by Noel Tue Feb 17, 2004 )
|InfoSec in Campus and Open Environments|
|"Much of an information security professional’s job involves keeping outsiders away from the internal network. Much time and money is spent on firewalls and Intrusion Detection Systems to protect gateway machines. Physical security may also be taken care of with access cards and locked doors. This is all fine and good for corporate environments, but what about open environments like university campuses?" eBCVG|
( Permalink: InfoSec in Campus and Open Environments Submitted by Dr.T Tue Feb 17, 2004 )
|The Register reports on Solaris 10 and the revised Solaris TCP/IP stack.
"For the Unix SMP crowd, Sun has a host of new features, including containers, better diagnostic tools, and beefed up security. At the low-end, Sun is claiming it will soon provide evidence that Solaris 10 can outperform Linux when running standard Web and application server software - be it a one or four processor box."
( Permalink: Solaris 10 Submitted by Noel Tue Feb 17, 2004 )
|Monitoring Net Traffic with OpenBSD's Packet Filte|
|Sys Admin Magazine tells us how to use OpenBSD's Packet Filter.
"Because the bandwidth costs me actual dollars for usage and over-usage, I needed to monitor how much is used, and by whom. This would be easy to solve if I controlled the upstream router for the box, but I don't. However, as I was setting up tighter security on my OpenBSD machine, I noticed that the Packet Filtering firewall software could give me statistics on named rules. By naming the rules that pass traffic, I could query the pf subsystem frequently and get traffic data. Problem solved!"
( Permalink: Monitoring Net Traffic with OpenBSD's Packet Filte Submitted by Noel Tue Feb 17, 2004 )
|Mepis Linux Founder Warren Woodford|
|Techdot talks to Warren Woodford, founder of Mepis Linux.
"For that amount of money, minus the upfront cost of installing MEPIS Linux, MEPIS or a MEPIS affiliate will retrain your workforce. Or you can get some training from MEPIS and do the rest in-house. Pick an office or a department, give us a pilot project and we'll prove it. If we're right, you'll break even in the first year--and be a hero in your organization."
( Permalink: Mepis Linux Founder Warren Woodford Submitted by Noel Tue Feb 17, 2004 )
|Memory Hygiene in C and C++|
|Informit brings us: Memory Hygiene in C and C++: Safe Programming with Risky Data.
"In the abstract, the only things that can go wrong with C and C++ memory management are bad pointers and leaked memory. Pointers might be uninitialized; they might be incorrectly initialized (often to NULL); they might point to memory that's no longer safe to use; they might point to wrong data—frequently mistyped data."
( Permalink: Memory Hygiene in C and C++ Submitted by Noel Tue Feb 17, 2004 )
|Touch Screen Voting Security|
|The Atlanta Journal-Constitution talks about touch-screen voting security in Georgia.
"The researchers concluded the system is vulnerable to attacks that use software programs designed to discreetly activate themselves and change election results. Also, Rubin said, blank smart cards could be bought and programmed by someone able to decipher the necessary computer language to make "homebrew" voter access cards. The privacy of the voting booth would allow someone to sneak in a stack of the homebrew cards and vote multiple times, he said."
( Permalink: Touch Screen Voting Security Submitted by Noel Mon Feb 16, 2004 )
|Migrating to the Linux 2.6 Kernel|
|Linux Devices walks us through migrating to Linux 2.6 kernel.
"Kernel configuration has changed for the better in the 2.6 Linux kernel. The new graphical configuration editors used by the 2.6 Linux kernel make it easier than ever before to reconfigure kernel compilation settings and identify the dependencies between different kernel configuration variables. Earlier 2.x-based kernels provided four basic kernel configuration editors:"
( Permalink: Migrating to the Linux 2.6 Kernel Submitted by Noel Mon Feb 16, 2004 )
|Safely Creating Temporary Files in Shell Scripts|
|Linux Security brings us: Safely Creating Temporary Files in Shell Scripts.
"This paper discusses how a programmer can write shell scripts that securely create temporary files in world/group writable directories. After explaining why it is important to be careful with temporary files I give some hints on how to identify and fix vulnerable shell scripts. This paper concentrates on how things are done. I intentionally leave out lots of gory details in order to make this document shorter and easier to understand for people that just want to write secure code with as little extra effort as possible."
( Permalink: Safely Creating Temporary Files in Shell Scripts Submitted by Noel Mon Feb 16, 2004 )
|Apache Keys and Certificates with mod_ssl|
|Builder.com tells us how to use mod_ssl.
"But you have some formidable resources at your disposal. With Apache's mod_ssl module, you have considerable power over your encryption/authentication implementation. Secure Sockets Layer (SSL), in its open protocol form (Transport Layer Security, or TLS), has what you need and, with mod_ssl, you can make it conform to your particular needs."
( Permalink: Apache Keys and Certificates with mod_ssl Submitted by Noel Mon Feb 16, 2004 )
|Cubicleware: Sun's JDS vs. Ximian XD2|
|Newsforge brings us: Cubicleware: Sun's JDS vs. Ximian XD2.
Sun JDS and Novell Ximian XD2 are not touted as general-purpose soup-to-nuts Linux distros. They are meant to be efficient and usable productivity desktops that can be quickly mastered by the non-technical workers who do the administrative heavy lifting in government offices, large universities, and in some big corporation settings. Both distros offer streamlined GNOME desktops with features reminiscent of recent versions of Windows that make it easy to find key applications like word processor and email client, and both attempt to mask large parts of the file system to make it easier for people to keep track of their files."
( Permalink: Cubicleware: Sun's JDS vs. Ximian XD2 Submitted by Noel Mon Feb 16, 2004 )
|Writing man Pages|
|Linux.com takes us through creating man pages.
"Man pages are written in a markup language, generally referred to as nroff; in fact, there are other processors for it (such as troff or groff), but it's all the same language. Nroff is a markup language, but it's a bit more primitive than HTML or SGML. On the other hand, it's a macro language, so arbitrarily complex things can be done in it. There are sets of macros designed to support certain document types."
( Permalink: Writing man Pages Submitted by Noel Mon Feb 16, 2004 )
|Chrooting Apache and PHP in BSD|
|BSD Hound tells us how to chroot Apache and PHP under BSD.
"So why chroot instead of jail? Jailing processes is actually a simple task. Basically i want to help you out with 2 areas in this article. The first being to get apache and php chrooted while working with a chrooted mysql. And the second i hope you can figure out from this how to chroot your own processes. Once you figure out how to setup chroot trees configuring jails should not be a challenge for you at all"
( Permalink: Chrooting Apache and PHP in BSD Submitted by Noel Sun Feb 15, 2004 )