# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Host-Based Firewalls Implemented With Linux iptabl
Informit brings us: Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables.
"Host-based firewalls offer improved protection against the previously mentioned threats, and software is widely available for many systems. Linux systems support a kernel-based packet filter that is a suitable tool for constructing host-based firewalls. However, constructing a good set of rules that adequately protects a host is not trivial."

( Permalink: Host-Based Firewalls Implemented With Linux iptabl      Submitted by Noel Tue Feb 10, 2004 )

Installing phpMyAdmin on Linux
GeekSpeek tells us how to set up phpMyAdmin on Linux.
"Some of its current capabilities include the ability to create and drop databases, create , drop, and alter tables, execute SQL statements, delete, edit, and add fields, manage keys on fields, and manage privileges. In addition, it has the ability to export your data in a number of different formats. phpMyAdmin is an excellent tool and will make the life of any MySQL database administrator much more enjoyable. "

( Permalink: Installing phpMyAdmin on Linux      Submitted by Noel Tue Feb 10, 2004 )

Review of KDE 3.2
FedoraNEWS looks at KDE 3.2.
"Konqueror: This is the central part of KDE environment. it is a web browser, file manager, network browser and so on. Konqueror has finally matured as a web browser. I feel, though many would disagree with me, that rendering of sites is sometimes better than Mozilla. I find this difference while checking out IE based sites. This is just my observation and I cannot quantify this in any way."

( Permalink: Review of KDE 3.2      Submitted by Noel Tue Feb 10, 2004 )

Review of MandrakeMove
My first Linux distribution was the summer 94 yggdrasil CD. Which like MandrakeMove was a live CD based distribution. Live CD based distributions are a great way to introduce someone to Linux and with MandrakeMove we have a great distribution for an experienced user or a novice.

( Permalink: Review of MandrakeMove      Submitted by Noel Mon Feb 9, 2004 )

Big Blue Linux?
John Dvorak talks about IBM and Linux and DesktopOS also makes some comments.
"Although nobody has been able to smuggle out a single screenshot of the top-secret IBM Linux desktop OS—often referred to as Blue Linux—I have friends who have seen it. I am assured that it not only exists, but is being used by large numbers of IBMers. "They are going through a process of eating their own dog food right now," I was told."

( Permalink: Big Blue Linux?      Submitted by Noel Mon Feb 9, 2004 )

Red Hat Enterprise Linux 3
Unix Review takes a look at Red Hat Enterprise Linux 3.

"Enterprise Linux 3 looks and feels more like a steady, sober corporate computer system than previous Red Hat offerings, although the changes to the user experience are subtle and may not attract a lot of attention. The real changes are largely invisible to the user — better performance, and better and more efficient support for alternative platforms. But you'll also find enhanced support (including improvements to the Red Hat Network services) and better tools for enterprise administration, such as better deployment and rollout tools and new support for diskless clients. Is it worth it? That depends on who you are."

( Permalink: Red Hat Enterprise Linux 3      Submitted by Noel Mon Feb 9, 2004 )

HP Helps U.S. Clamp Down on Counterfeiting
HP is talking about ways to print their printers from being used to counterfeit money.
" This technique would detect the characteristic color of frequently counterfeited documents ("banknote green"). Were a user to attempt to print a banknote using the exact green in the correct density for a bill, the printer could modulate the color somewhat to produce distinct, visible bands of color. The change in the color wouldn't be visible in other images that use lots of green (photos of trees, for example), but would be evident in bills."

( Permalink: HP Helps U.S. Clamp Down on Counterfeiting      Submitted by Noel Mon Feb 9, 2004 )

Automating Security with GNU cfengine
Linux Journal tells us about cfengine.
"This is where GNU cfengine, by Mark Burgess, comes into play. It allows you to affect changes effortlessly across any number of dissimilar systems. Perhaps even more important, it provides automatic documentation of exactly what you did. You even can use a few comments to explain why you did it. Each of your systems become a member of one or more classes, and changes are made on a per-class basis. If a new system arrives, it automatically acquires the changes previously made to other members of its class."

( Permalink: Automating Security with GNU cfengine      Submitted by Noel Mon Feb 9, 2004 )

2.0 Linux Kernel Maintainer David Weinehall
KernelTrap has interviewed David Weinehall, the maintainer of the 2.0 Linux kernel. David became the 2.0 maintainer in December of 1999, after Alan Cox moved on to work full time on the 2.2 kernel. In this interview David talks about what's involved in maintaining the 2.0 kernel, who uses it, when we can expect the impending release of 2.0.40, and more.

( Permalink: 2.0 Linux Kernel Maintainer David Weinehall      Submitted by Jeremy Andrews Mon Feb 9, 2004 )

Inside a Linksys 802.11g Wireless Router
Seattlewireless tells us all about the Linksys 802.11g Wireless Cable/DSL Router running the Linux kernel and other GPL utilities.

"Unfortunately Broadcom has configured to PMON to boot straight into Linux. I've tried all sorts of shortcuts to stop it from booting - to no avail. I ended up with disassembling the bl to figure out what is going on. Solution: You'll have to set the nvram variable boot_wait to on. After doing so the bl will pause for a short amount of time and you'll be able to jump into the shell by hitting Ctrl + C."

( Permalink: Inside a Linksys 802.11g Wireless Router      Submitted by Noel Sun Feb 8, 2004 )

Spawn of Debian Faceoff
Linux.com brings us: Spawn of Debian faceoff: final chapter.
"We compared the distributions in five categories: installation, connectivity, security, software maintenance, and (free or included) support. Where prices are shown, we used the retail price of the version of the distribution we tested. The average of these five scores was used as the final grade."

( Permalink: Spawn of Debian Faceoff      Submitted by Noel Sun Feb 8, 2004 )

Very Small Editors
Linux Magazine takes a look at ex, ed, and sed.
"If your terminal or system is corrupted, or if you're trying to edit over a clogged network link, using a line editor can mean the difference between getting your edits done and not. This can be important when, say, you need to edit a system configuration file but you can't run a screen-oriented editor. If you're a system administrator, you should know how to use a line editor!"

( Permalink: Very Small Editors      Submitted by Noel Sun Feb 8, 2004 )

Asynchronous Replication With Pratima
Linux Journal takes a look at Asynchronous Replication with Pratima.
"Pratima (meaning reflection or image in Sanskrit) provides block-level, real-time replication of one or more block devices on a client computer. The devices are replicated to a server computer. A local device (say /dev/sda4) is placed under control of Pratima, which then offers access through its own block device (say /dev/srr0)."

( Permalink: Asynchronous Replication With Pratima      Submitted by Noel Sun Feb 8, 2004 )

Security: Preventing Today's Top Vulnerability
This article discusses the top vulnerability in Linux/UNIX systems: buffer overflows. This article first explains what buffer overflows are and why they're both so common and so dangerous. It then discusses the new Linux and UNIX methods for broadly countering them -- and why these methods are not enough. It then shows various ways to counter buffer overflows in C/C++ programs, both statically-sized approaches (such as the standard C library and OpenBSD/strlcpy solution) and dynamically-sized solutions, as well as some tools to help you. Finally, the article closes with some predictions on the future of buffer overflow vulnerabilities.

( Permalink: Security: Preventing Today's Top Vulnerability      Submitted by Anonymous Sat Feb 7, 2004 )

How-to for Hybrid Clusters
Linux Gazette brings us: How-to for Hybrid Clusters.
"The purpose of this document is to fully describe and enumerate the steps involved in building a hybrid cluster which takes advantage of both computational clustering and device-level, high-availability clustering using nothing more than standard, open-source software and commodity hardware. None of the software used in this costs a thing, and the hardware used in this arrangement should be available for relatively cheap prices from most computer parts stores or online retailers."

( Permalink: How-to for Hybrid Clusters      Submitted by Noel Sat Feb 7, 2004 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Snort Enterprise Implementation
(Tue Apr 22, 2003)

Snort Problems
(Tue Apr 22, 2003)

Linux Security: Kinds of Encryption
(Tue Apr 22, 2003)

Novell Elaborates on Linux
(Fri Apr 18, 2003)

Web Filtering with Open Source
(Fri Apr 18, 2003)

MySQL Rides Open Source Wave Into DBs
(Fri Apr 18, 2003)

Intel's Jump to 800MHz FSB: The Linux Side
(Fri Apr 18, 2003)

Fundamentals of UNIX Companion Guide
(Thu Apr 17, 2003)

Take it to the Next Level with Metaclasses
(Thu Apr 17, 2003)

Total Computer Newbies Meet Debian
(Thu Apr 17, 2003)

Rubrica and DOSBox
(Thu Apr 17, 2003)

How to Install Another Hard Disk
(Wed Apr 16, 2003)

The Future of the Linux Kernel
(Wed Apr 16, 2003)

Cheap IP Takeover
(Wed Apr 16, 2003)

Cryptographic File Systems
(Wed Apr 16, 2003)

Novell Adopts Linux
(Wed Apr 16, 2003)

Book Review: Hacker's Challenge 2
(Tue Apr 15, 2003)

Red Hat Linux 9 Release and Interview
(Tue Apr 15, 2003)

The State of Linux in Maine
(Tue Apr 15, 2003)

Improve Linux Performance
(Tue Apr 15, 2003)

Save Money with a Linux Media Jukebox
(Tue Apr 15, 2003)

E7505 Boards Linux Reviewed
(Mon Apr 14, 2003)

Total Computer Newbies Meet Debian
(Mon Apr 14, 2003)

Harness the Power of XML with Eclipse
(Mon Apr 14, 2003)

Review - Training Course for Red Hat Linux
(Mon Apr 14, 2003)

Interview with Fink Project Leader Max Horn
(Fri Apr 11, 2003)

How to Conduct Your Own Security Audit
(Fri Apr 11, 2003)

Porting The PF Stateful Packet Filter
(Fri Apr 11, 2003)

Tip: Remove Duplicate Lines Wth uniq
(Fri Apr 11, 2003)

Rational Releases Developer Powerpack
(Wed Apr 9, 2003)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author