|Informit brings us:
Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables.
"Host-based firewalls offer improved protection against the previously mentioned threats, and software is widely available for many systems. Linux systems support a kernel-based packet filter that is a suitable tool for constructing host-based firewalls. However, constructing a good set of rules that adequately protects a host is not trivial."
( Permalink: Host-Based Firewalls Implemented With Linux iptabl Submitted by Noel Tue Feb 10, 2004 )
|Installing phpMyAdmin on Linux|
|GeekSpeek tells us how to set up phpMyAdmin on Linux.
"Some of its current capabilities include the ability to create and drop databases, create , drop, and alter tables, execute SQL statements, delete, edit, and add fields, manage keys on fields, and manage privileges. In addition, it has the ability to export your data in a number of different formats. phpMyAdmin is an excellent tool and will make the life of any MySQL database administrator much more enjoyable. "
( Permalink: Installing phpMyAdmin on Linux Submitted by Noel Tue Feb 10, 2004 )
|Review of KDE 3.2|
|FedoraNEWS looks at KDE 3.2.
"Konqueror: This is the central part of KDE environment. it is a web browser, file manager, network browser and so on. Konqueror has finally matured as a web browser. I feel, though many would disagree with me, that rendering of sites is sometimes better than Mozilla. I find this difference while checking out IE based sites. This is just my observation and I cannot quantify this in any way."
( Permalink: Review of KDE 3.2 Submitted by Noel Tue Feb 10, 2004 )
|Review of MandrakeMove|
|My first Linux distribution was the summer 94 yggdrasil CD. Which like MandrakeMove was a live CD based distribution. Live CD based distributions are a great way to introduce someone to Linux and with MandrakeMove we have a great distribution for an experienced user or a novice. |
( Permalink: Review of MandrakeMove Submitted by Noel Mon Feb 9, 2004 )
|Big Blue Linux?|
|John Dvorak talks about IBM and Linux and DesktopOS also makes some comments.
"Although nobody has been able to smuggle out a single screenshot of the top-secret IBM Linux desktop OS—often referred to as Blue Linux—I have friends who have seen it. I am assured that it not only exists, but is being used by large numbers of IBMers. "They are going through a process of eating their own dog food right now," I was told."
( Permalink: Big Blue Linux? Submitted by Noel Mon Feb 9, 2004 )
|Red Hat Enterprise Linux 3|
|Unix Review takes a look at Red Hat Enterprise Linux 3.
"Enterprise Linux 3 looks and feels more like a steady, sober corporate computer system than previous Red Hat offerings, although the changes to the user experience are subtle and may not attract a lot of attention. The real changes are largely invisible to the user — better performance, and better and more efficient support for alternative platforms. But you'll also find enhanced support (including improvements to the Red Hat Network services) and better tools for enterprise administration, such as better deployment and rollout tools and new support for diskless clients. Is it worth it? That depends on who you are."
( Permalink: Red Hat Enterprise Linux 3 Submitted by Noel Mon Feb 9, 2004 )
|HP Helps U.S. Clamp Down on Counterfeiting|
|HP is talking about ways to print their printers from being used to counterfeit money.
" This technique would detect the characteristic color of frequently counterfeited documents ("banknote green"). Were a user to attempt to print a banknote using the exact green in the correct density for a bill, the printer could modulate the color somewhat to produce distinct, visible bands of color. The change in the color wouldn't be visible in other images that use lots of green (photos of trees, for example), but would be evident in bills."
( Permalink: HP Helps U.S. Clamp Down on Counterfeiting Submitted by Noel Mon Feb 9, 2004 )
|Automating Security with GNU cfengine|
|Linux Journal tells us about cfengine.
"This is where GNU cfengine, by Mark Burgess, comes into play. It allows you to affect changes effortlessly across any number of dissimilar systems. Perhaps even more important, it provides automatic documentation of exactly what you did. You even can use a few comments to explain why you did it. Each of your systems become a member of one or more classes, and changes are made on a per-class basis. If a new system arrives, it automatically acquires the changes previously made to other members of its class."
( Permalink: Automating Security with GNU cfengine Submitted by Noel Mon Feb 9, 2004 )
|2.0 Linux Kernel Maintainer David Weinehall|
|KernelTrap has interviewed David Weinehall, the maintainer of the 2.0 Linux kernel. David became the 2.0 maintainer in December of 1999, after Alan Cox moved on to work full time on the 2.2 kernel. In this interview David talks about what's involved in maintaining the 2.0 kernel, who uses it, when we can expect the impending release of 2.0.40, and more.|
( Permalink: 2.0 Linux Kernel Maintainer David Weinehall Submitted by Jeremy Andrews Mon Feb 9, 2004 )
|Inside a Linksys 802.11g Wireless Router|
|Seattlewireless tells us all about the Linksys 802.11g Wireless Cable/DSL Router running the Linux kernel and other GPL utilities.
"Unfortunately Broadcom has configured to PMON to boot straight into Linux. I've tried all sorts of shortcuts to stop it from booting - to no avail. I ended up with disassembling the bl to figure out what is going on. Solution: You'll have to set the nvram variable boot_wait to on. After doing so the bl will pause for a short amount of time and you'll be able to jump into the shell by hitting Ctrl + C."
( Permalink: Inside a Linksys 802.11g Wireless Router Submitted by Noel Sun Feb 8, 2004 )
|Spawn of Debian Faceoff|
|Linux.com brings us:
Spawn of Debian faceoff: final chapter.
"We compared the distributions in five categories: installation, connectivity, security, software maintenance, and (free or included) support. Where prices are shown, we used the retail price of the version of the distribution we tested. The average of these five scores was used as the final grade."
( Permalink: Spawn of Debian Faceoff Submitted by Noel Sun Feb 8, 2004 )
|Very Small Editors|
|Linux Magazine takes a look at ex, ed, and sed.
"If your terminal or system is corrupted, or if you're trying to edit over a clogged network link, using a line editor can mean the difference between getting your edits done and not. This can be important when, say, you need to edit a system configuration file but you can't run a screen-oriented editor. If you're a system administrator, you should know how to use a line editor!"
( Permalink: Very Small Editors Submitted by Noel Sun Feb 8, 2004 )
|Asynchronous Replication With Pratima|
|Linux Journal takes a look at
Asynchronous Replication with Pratima.
"Pratima (meaning reflection or image in Sanskrit) provides block-level, real-time replication of one or more block devices on a client computer. The devices are replicated to a server computer. A local device (say /dev/sda4) is placed under control of Pratima, which then offers access through its own block device (say /dev/srr0)."
( Permalink: Asynchronous Replication With Pratima Submitted by Noel Sun Feb 8, 2004 )
|Security: Preventing Today's Top Vulnerability|
|This article discusses the top vulnerability in Linux/UNIX systems: buffer overflows. This article first explains what buffer overflows are and why they're both so common and so dangerous. It then discusses the new Linux and UNIX methods for broadly countering them -- and why these methods are not enough. It then shows various ways to counter buffer overflows in C/C++ programs, both statically-sized approaches (such as the standard C library and OpenBSD/strlcpy solution) and dynamically-sized solutions, as well as some tools to help you. Finally, the article closes with some predictions on the future of buffer overflow vulnerabilities.|
( Permalink: Security: Preventing Today's Top Vulnerability Submitted by Anonymous Sat Feb 7, 2004 )
|How-to for Hybrid Clusters|
|Linux Gazette brings us:
How-to for Hybrid Clusters.
"The purpose of this document is to fully describe and enumerate the steps involved in building a hybrid cluster which takes advantage of both computational clustering and device-level, high-availability clustering using nothing more than standard, open-source software and commodity hardware. None of the software used in this costs a thing, and the hardware used in this arrangement should be available for relatively cheap prices from most computer parts stores or online retailers."
( Permalink: How-to for Hybrid Clusters Submitted by Noel Sat Feb 7, 2004 )