# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Towards Linux 2.6
The impending release of a new stable kernel promises greater adoption for Linux, as it becomes more reliable and scalable over a larger variety of processors. This is a new article that highlights some of the changes, both big and small, with some code samples.

( Permalink: Towards Linux 2.6      Submitted by Anonymous Wed Sep 24, 2003 )

Linux HOWTO: Read and Write in Hindi
This is a simple HOWTO on setting up your Linux machine to read and write in Indian Languages like Marathi, Hindi, etc. We take the popular messaging client GAIM as an example and show you how you can communicate in Hindi. Read the complete HOWTO on Freedom Ink.

( Permalink: Linux HOWTO: Read and Write in Hindi      Submitted by Chandrashekhar Bhosle Tue Sep 23, 2003 )

Linux on the AMD Opteron: Are We Ready?
"Early last week I received an AMD Opteron 240 and an Asus SK8N motherboard. I was so anxious to get Linux on it I could hardly sit still... A week later, Linux is on it, in 32 bit mode only, and my hard drive has informed me that if I reinstall again it is going to go on strike." Read the rest of the report at OSNews.

( Permalink: Linux on the AMD Opteron: Are We Ready?      Submitted by Anonymous Tue Sep 23, 2003 )

Authenticating LinuxWith IBM Directory Server
This article describes how to use the IBM Directory Server to authenticate Linux users. The author explains step-by-step how to configure Directory Server, and Linux, to build a basic configuration to use Directory Server to authenticate Linux users.

( Permalink: Authenticating LinuxWith IBM Directory Server      Submitted by Anonymous Tue Sep 23, 2003 )

A Newbie's Guide to Setting up PF on OpenBSD 3.x
Since PF replaced IPF on OpenBSD starting with OpenBSD 3.0, it has become a world-class firewalling solution. Within PF, there are some excellent facilities to help the firewaller build a robust solution providing a protection for private networks in a hostile internet. The goal of this article is to give you a good step-by-step on setting up your PF firewall, and explains each step sufficiently, but not so deep that it would confuse. Article

( Permalink: A Newbie's Guide to Setting up PF on OpenBSD 3.x      Submitted by Dr.T Tue Sep 23, 2003 )

Measuring Linux Scheduler Improvements
Mark Wong recently posted a series of benchmark results that show how the Linux scheduler has improved since early on in the 2.5 development cycle. The results were generated with Rusty Russell's Hackbench, a modified 'chat benchmark'. Read the full story at KernelTrap.

( Permalink: Measuring Linux Scheduler Improvements      Submitted by Anonymous Mon Sep 22, 2003 )

Groklaw Responds to Darl McBride's Open Letter
Dear Mr. McBride,

Recently you wrote an "open letter to the open source community" published September 9, 2003 by LinuxWorld. This reply is from a group within the open source / free software community. Because you addressed your letter to our community-at-large, we thought we should answer you ourselves.

( Permalink: Groklaw Responds to Darl McBride's Open Letter      Submitted by Harry Clayton Mon Sep 22, 2003 )

Book Review: Managing Linux Systems with Webmin
What to expect from a Webmin system administration book that's written by the same guy that developed Webmin? Cameron combined all the knowledge and experience on the subject and transformed it into this complete Webmin companion guide.

Story

( Permalink: Book Review: Managing Linux Systems with Webmin      Submitted by LogError Mon Sep 22, 2003 )

Software Review: djbdns

A few months ago, I discovered djbdns from an article on rootprompt. I spent some time studying the program and summed my toughts in this article:

In the recent years, other DNS programs have appeared. Most of these newcomers are targeted at big corporations that must manage thousands of zones. These programs often use a database backend. djbdns is different in that it is designed with security in mind. In this article I explain how I see the principles that are the foundation of djbdns and their implications.

Comments are welcomed on the article page or directly by email.

( Permalink: Software Review: djbdns      Submitted by Guillaume Filion Mon Sep 22, 2003 )

Boot Linux Faster
This article shows you how to improve the boot speed of your Linux system without compromising usability. Essentially, the technique involves understanding system services and their dependencies, and having them start up in parallel, rather than sequentially, when possible.

( Permalink: Boot Linux Faster      Submitted by Idean Mon Sep 22, 2003 )

Network Programming With the Twisted Framework
In this final installment of his series on Twisted, the author looks at specialized protocols and servers contained in the Twisted package, with a focus on secure connections. One thing the servers and clients in Parts 1, 2, and 3 had in common is that they operated completely in the clear, cryptographically speaking. Sometimes, however, you want to keep your connection free from prying eyes (or from tampering/spoofing).

( Permalink: Network Programming With the Twisted Framework      Submitted by Anonymous Sun Sep 21, 2003 )

Review - Red Hat Linux Administration
There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can be applied to other Linux distributions. Is it worth reading?
Article.

( Permalink: Review - Red Hat Linux Administration      Submitted by LogError Sat Sep 20, 2003 )

Sun the Dell of Enterprise Software?
ZDNet asks is Sun going to become the Dell of enterprise software?
"Sun differentiates its services strategy from IBM's by dictating that business practices change to align with the software, rather than change the software to align with the business practice. This sounds like the IBM of old that thrived on locking customers into its own hardware and software."

( Permalink: Sun the Dell of Enterprise Software?      Submitted by Noel Fri Sep 19, 2003 )

Fine-Tuning Linux Administration with ACLs
Crossnodes tells us how to use ACLs to Fine-Tune Linux.
"At a minimum, an ACL must have three attributes: an entry type, either group or user; a groupname or username, or numeric ID; and the access permissions, which are the usual read/write/execute. These three attributes must always be present, and only one of each can be defined per ACL."

( Permalink: Fine-Tuning Linux Administration with ACLs      Submitted by Noel Fri Sep 19, 2003 )

SuSE Linux Professional 8.2 Review
Linux Journal reviews SuSE Linux Professional 8.2.
"YaST 2, SuSE's second-generation setup tool, is a total dream. (Keep in mind this is a Debian fan talking here.) The software installer looks very much like the install screen and shows you which CDs you need to use and for how long; I imagine it's much of the same code. The system tool lets you do everything from edit /etc/sysconfig files to back up the system. The firewall tool, under Security, allows for some fairly advanced configuration, including DMZ and IP masquerade, right there under the GUI. I could go on about this, but it's getting long already. Oh, and if you're shelling in on a slow modem from Timbuktu, you should know that YaST 2 works in text mode, too. "

( Permalink: SuSE Linux Professional 8.2 Review      Submitted by Noel Fri Sep 19, 2003 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Last Minute Kernel Additions
(Mon Nov 4, 2002)

Simple Things to Improve Your System's Security
(Mon Nov 4, 2002)

Evil Entity
(Mon Nov 4, 2002)

Linux In the Automotive Industry
(Fri Nov 1, 2002)

Advanced Filesystem Implementor's Guide, Part 12
(Fri Nov 1, 2002)

Interview With Author of OpenBSD's Packet Filter
(Fri Nov 1, 2002)

Linux X-Terminal with Debian
(Fri Nov 1, 2002)

Linux, and the Path to the Desktop
(Thu Oct 31, 2002)

Using LinNeighborhood to Create a Network Neighbor
(Thu Oct 31, 2002)

Realfeel Test of the Preemptible Kernel Patch
(Thu Oct 31, 2002)

Network Security with OpenSSL
(Thu Oct 31, 2002)

Gentoo Linux Reloaded
(Wed Oct 30, 2002)

Open Source in the Lab
(Wed Oct 30, 2002)

RealNetworks Reveals Code in Single Helix
(Wed Oct 30, 2002)

Unreal Tournament 2003 on Linux
(Wed Oct 30, 2002)

Authentication of Users Using LDAP via RADIUS
(Wed Oct 30, 2002)

How to conduct a Web site competitive analysis
(Tue Oct 29, 2002)

Paper: Debian log server
(Tue Oct 29, 2002)

Review of Red Hat 8.0 Professional
(Tue Oct 29, 2002)

Debian 3.0 Installation
(Tue Oct 29, 2002)

Speed-Start Your Linux App: Using DB2
(Fri Oct 25, 2002)

Linux vs. Windows Installation
(Fri Oct 25, 2002)

SquirrelMail
(Fri Oct 25, 2002)

Reverse Engineering Hostile Code
(Fri Oct 25, 2002)

Dangerous Server Rooms
(Fri Oct 25, 2002)

Business-App Implemention
(Thu Oct 24, 2002)

Configuring Firewalls for Linux (kernel 2.4.x)
(Thu Oct 24, 2002)

LCD Monitor Round-Up
(Thu Oct 24, 2002)

Bill to Outlaw GPL
(Thu Oct 24, 2002)

Security Concerns in Licensing Agreements
(Wed Oct 23, 2002)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author