|The impending release of a new stable kernel promises greater adoption for Linux, as it becomes more reliable and scalable over a larger variety of processors. This is a new article that highlights some of the changes, both big and small, with some code samples.|
( Permalink: Towards Linux 2.6 Submitted by Anonymous Wed Sep 24, 2003 )
|Linux HOWTO: Read and Write in Hindi|
|This is a simple HOWTO on setting up your Linux machine to read and write in Indian Languages like Marathi, Hindi, etc. We take the popular messaging client GAIM as an example and show you how you can communicate in Hindi. Read the complete HOWTO on Freedom Ink.|
( Permalink: Linux HOWTO: Read and Write in Hindi Submitted by Chandrashekhar Bhosle Tue Sep 23, 2003 )
|Linux on the AMD Opteron: Are We Ready?|
|"Early last week I received an AMD Opteron 240 and an Asus SK8N motherboard. I was so anxious to get Linux on it I could hardly sit still... A week later, Linux is on it, in 32 bit mode only, and my hard drive has informed me that if I reinstall again it is going to go on strike." Read the rest of the report at OSNews.|
( Permalink: Linux on the AMD Opteron: Are We Ready? Submitted by Anonymous Tue Sep 23, 2003 )
|Authenticating LinuxWith IBM Directory Server|
|This article describes how to use the IBM Directory Server to authenticate Linux users. The author explains step-by-step how to configure Directory Server, and Linux, to build a basic configuration to use Directory Server to authenticate Linux users.|
( Permalink: Authenticating LinuxWith IBM Directory Server Submitted by Anonymous Tue Sep 23, 2003 )
|A Newbie's Guide to Setting up PF on OpenBSD 3.x|
|Since PF replaced IPF on OpenBSD starting with OpenBSD 3.0, it has become a world-class firewalling solution. Within PF, there are some excellent facilities to help the firewaller build a robust solution providing a protection for private networks in a hostile internet. The goal of this article is to give you a good step-by-step on setting up your PF firewall, and explains each step sufficiently, but not so deep that it would confuse.
( Permalink: A Newbie's Guide to Setting up PF on OpenBSD 3.x Submitted by Dr.T Tue Sep 23, 2003 )
|Measuring Linux Scheduler Improvements|
|Mark Wong recently posted a series of benchmark results that show how the Linux scheduler has improved since early on in the 2.5 development cycle. The results were generated with Rusty Russell's Hackbench, a modified 'chat benchmark'. Read the full story at KernelTrap.|
( Permalink: Measuring Linux Scheduler Improvements Submitted by Anonymous Mon Sep 22, 2003 )
|Groklaw Responds to Darl McBride's Open Letter|
|Dear Mr. McBride,
Recently you wrote an "open letter to the open source community" published September 9, 2003 by LinuxWorld. This reply is from a group within the open source / free software community. Because you addressed your letter to our community-at-large, we thought we should answer you ourselves.
( Permalink: Groklaw Responds to Darl McBride's Open Letter Submitted by Harry Clayton Mon Sep 22, 2003 )
|Book Review: Managing Linux Systems with Webmin|
|What to expect from a Webmin system administration book that's written by the same guy that developed Webmin? Cameron combined all the knowledge and experience on the subject and transformed it into this complete Webmin companion guide.
( Permalink: Book Review: Managing Linux Systems with Webmin Submitted by LogError Mon Sep 22, 2003 )
|Software Review: djbdns|
A few months ago, I discovered djbdns from an article on rootprompt. I spent some time studying the program and summed my toughts in this article:
In the recent years, other DNS programs have appeared. Most of these newcomers are targeted at big corporations that must manage thousands of zones. These programs often use a database backend. djbdns is different in that it is designed with security in mind. In this article I explain how I see the principles that are the foundation of djbdns and their implications.
Comments are welcomed on the article page or directly by email.
( Permalink: Software Review: djbdns Submitted by Guillaume Filion Mon Sep 22, 2003 )
|Boot Linux Faster|
|This article shows you how to improve the boot speed of your Linux system without compromising usability. Essentially, the technique involves understanding system services and their dependencies, and having them start up in parallel, rather than sequentially, when possible.|
( Permalink: Boot Linux Faster Submitted by Idean Mon Sep 22, 2003 )
|Network Programming With the Twisted Framework|
|In this final installment of his series on Twisted, the author looks at specialized protocols and servers contained in the Twisted package, with a focus on secure connections. One thing the servers and clients in Parts 1, 2, and 3 had in common is that they operated completely in the clear, cryptographically speaking. Sometimes, however, you want to keep your connection free from prying eyes (or from tampering/spoofing). |
( Permalink: Network Programming With the Twisted Framework Submitted by Anonymous Sun Sep 21, 2003 )
|Review - Red Hat Linux Administration|
|There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can be applied to other Linux distributions. Is it worth reading? |
( Permalink: Review - Red Hat Linux Administration Submitted by LogError Sat Sep 20, 2003 )
|Sun the Dell of Enterprise Software?|
|ZDNet asks is
Sun going to become the Dell of enterprise software?
"Sun differentiates its services strategy from IBM's by dictating that business practices change to align with the software, rather than change the software to align with the business practice. This sounds like the IBM of old that thrived on locking customers into its own hardware and software."
( Permalink: Sun the Dell of Enterprise Software? Submitted by Noel Fri Sep 19, 2003 )
|Fine-Tuning Linux Administration with ACLs|
|Crossnodes tells us how to use ACLs to
"At a minimum, an ACL must have three attributes: an entry type, either group or user; a groupname or username, or numeric ID; and the access permissions, which are the usual read/write/execute. These three attributes must always be present, and only one of each can be defined per ACL."
( Permalink: Fine-Tuning Linux Administration with ACLs Submitted by Noel Fri Sep 19, 2003 )
| SuSE Linux Professional 8.2 Review|
|Linux Journal reviews
SuSE Linux Professional 8.2.
"YaST 2, SuSE's second-generation setup tool, is a total dream. (Keep in mind this is a Debian fan talking here.) The software installer looks very much like the install screen and shows you which CDs you need to use and for how long; I imagine it's much of the same code. The system tool lets you do everything from edit /etc/sysconfig files to back up the system. The firewall tool, under Security, allows for some fairly advanced configuration, including DMZ and IP masquerade, right there under the GUI. I could go on about this, but it's getting long already. Oh, and if you're shelling in on a slow modem from Timbuktu, you should know that YaST 2 works in text mode, too. "
( Permalink: SuSE Linux Professional 8.2 Review Submitted by Noel Fri Sep 19, 2003 )