# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Access USB Devices from Java Applications
The Java platform has traditionally prided itself on its platform independence. While that independence has many benefits, it makes the process of writing Java applications that interact with hardware quite tricky. In this article, a research scientist examines two projects that are making the process easier by providing APIs through which Java applications can make use of USB devices. While both projects are still in embryo form, both show promise and are already serving as the foundations of some real-world applications.

( Permalink: Access USB Devices from Java Applications      Submitted by Bob Fri Sep 5, 2003 )

Boscov Inches Into Linux
Linux Planet tells us about Linux use by Boscov.
"Successful Linux deployments sometimes happen gradually. Boscov's, a Linux pioneer in the department store space, is a great case in point. The $1 billion regional retailer already uses Linux to run Apache, Radius, GNU Privacy Guard (GPG), IBM Tivoli's NetView, AcuCobol, special invoicing software, and Linuxcare's Levanta 2.0, among other apps and services."

( Permalink: Boscov Inches Into Linux      Submitted by Noel Fri Sep 5, 2003 )

Book Review: Absolute OpenBSD
OpenBSD packages a unique combination of security and usability. While I don't agree with Absolute OpenBSD's back cover when it gushes that "OpenBSD is the most secure operating system in the world" I can make arguments for Multics, QNX, OS/400, Plan 9, and more there's no denying that OpenBSD's security profile is far stronger than that of any of its direct competitors, certainly more "than any variety of Linux or Windows." UnixReview

( Permalink: Book Review: Absolute OpenBSD      Submitted by Danny Fri Sep 5, 2003 )

Opinion - SCO vs. IBM
Bob Toxen, the author of "Real World Linux Security: Intrusion Prevention, Detection, and Recovery", gives his take on the SCO situation.
Story

( Permalink: Opinion - SCO vs. IBM      Submitted by LogError Thu Sep 4, 2003 )

GUI vs. CLI: A Qualitative Comparison
In this article, I will be analyzing the specific properties that make the command line unique and irreplaceable. I will likewise analyze the graphical UI's features--though only giving it a cursory look, since I assume my audience does not need to be persuaded to make the most of its video hardware. I will be looking at the Unix shell, since it is the most full-featured and powerful of such interfaces (DOS, of course, had very few features worth talking about; it must be given its due, though--it brought millions of people into computing). I will be looking at GUIs on a more general level. Read the interesting comparison at OSNews by Greg Afinogenov.

( Permalink: GUI vs. CLI: A Qualitative Comparison      Submitted by Anonymous Thu Sep 4, 2003 )

Installing XFce-4 on SuSE 8.2
This guide will introduce you to XFce, the popular (ex-CDE-inspired) Unix/X11 graphical environment, and it will give you pointers how to install it.

( Permalink: Installing XFce-4 on SuSE 8.2      Submitted by Anonymous Thu Sep 4, 2003 )

Server Clinic: R Handy for Crunching Data
Learn about good choices for sophisticated statistical processing. R is sophisticated open-source software for managing statistical calculations. It's easy enough to use that it can benefit you even if you need only a fraction of its capabilities.

( Permalink: Server Clinic: R Handy for Crunching Data      Submitted by Bob Wed Sep 3, 2003 )

Cisco Security Specialist's Guide to PIX Firewalls
I expected that this book would give me what I was looking for out of a product-specific book, excellent coverage of the product and its features. It was all that and then some. I was thoroughly impressed with the coverage in this text. This book is perfect for anyone looking to gain familiarity with the Cisco PIX. It's also great for those looking to find solutions for existing PIX implementations. The main focus of this book is to prepare individuals for the corresponding exam as mentioned above. Without further delay, let's take a look at what's inside.
article

( Permalink: Cisco Security Specialist's Guide to PIX Firewalls      Submitted by Dr.T Wed Sep 3, 2003 )

Red Hat Enterprise Linux 2.95 AS Beta Preview
Red Hat released the beta for their upcoming Red Hat Enterprise Linux (RHEL) line recently (v2.95, Taroon) and OSNews sports a preview of this "high-end" Linux version of Red Hat. The article mentions the extra features you can find on this Enterprise version (e.g. the inclusion of the Eclipse IDE, Tomcat etc) and how it compares to its previous version.

( Permalink: Red Hat Enterprise Linux 2.95 AS Beta Preview      Submitted by Anonymous Wed Sep 3, 2003 )

Secure Programmer: Developing Secure Programs
This column explains how to write secure applications; it focuses on the Linux operating system, but many of the principles apply to any system. In today's networked world, software developers must know how to write secure programs, yet this information isn't widely known or taught. This first installment of the Secure programmer column introduces the basic ideas of how to write secure applications and discusses how to identify the security requirements for your specific application. Future installments will focus on different common vulnerabilities and how to prevent them.

( Permalink: Secure Programmer: Developing Secure Programs      Submitted by Idean Thu Aug 28, 2003 )

GNOME Trouble
In this weeks Security Alerts, we look at problems in BitKeeper, the GNOME Display Manager, rcpd, ViRobot Linux Server, OpenSLP, eMule, lMule, xMule, netris, and autorespond.

( Permalink: GNOME Trouble      Submitted by Noel Thu Aug 28, 2003 )

Wireless on Linux, Part 1
"For the harassed, overworked network admin, connecting new clients without having to run additional cabling is so much fun it feels wrong. Miles of pretty color-coded cables and tags are aesthetically pleasing and useful, of course, and who hasn't experienced the satisfaction of crimping connectors? There's nothing like the authoritative SNICK of a perfect crimp. (For some of us deskbound-geeks, grip strength is all we have.)" article

( Permalink: Wireless on Linux, Part 1      Submitted by Danny Wed Aug 27, 2003 )

Perens: IT Pros Must Lobby for Open Source
Open-source pioneer and evangelist Bruce Perens urges IT managers to lobby for the protection of open-source software from the infringing threat of software patents and legal liability.
Read the short interview

( Permalink: Perens: IT Pros Must Lobby for Open Source      Submitted by Jan Stafford Wed Aug 27, 2003 )

How Secure is Your Wireless Network?
Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP said - "Using a wireless netwok for mission-critical data is plain stupid. Using it for life-critical data is criminally negligent". Will this book help you secure your wireless LAN? Read on to find out.
Story

( Permalink: How Secure is Your Wireless Network?      Submitted by LogError Wed Aug 27, 2003 )

The Simplicity of Sockets
Randal Schwartz tells us about using sockets in PERL.
"To Perl, a socket is presented as a filehandle, and is read and written using ordinary filehandle operations. Just as a phone might be identified by its phone number, a socket is identified using its Internet (IP) address and port number."

( Permalink: The Simplicity of Sockets      Submitted by Noel Mon Aug 25, 2003 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Book review: Internet Site Security
(Thu Oct 17, 2002)

Interview With Con Kolivas
(Thu Oct 17, 2002)

Red Hat fights the DMCA
(Thu Oct 17, 2002)

The Antidesktop
(Thu Oct 17, 2002)

Make Python Run as Fast as c
(Wed Oct 16, 2002)

Footprints in the Sand
(Wed Oct 16, 2002)

Powering Up Your Home-Brewed Computer
(Wed Oct 16, 2002)

Yellow Dog Linux v2.3
(Wed Oct 16, 2002)

Radio E-mail in West Africa: The Complete Version
(Wed Oct 16, 2002)

HP's Open Source Efforts
(Tue Oct 15, 2002)

Universal Command Guide
(Tue Oct 15, 2002)

Digital Rights Management Issues
(Tue Oct 15, 2002)

Operating Systems Get Poor Security Grade
(Tue Oct 15, 2002)

Gentoo Linux Reloaded
(Tue Oct 15, 2002)

Cultured Perl: Genetic algorithms
(Mon Oct 14, 2002)

Clues, Vandalism, Litter Sendmail Trojan Trail
(Mon Oct 14, 2002)

Automating Tasks with Skulker
(Mon Oct 14, 2002)

Chroot Jails with the Jail Chroot Project
(Mon Oct 14, 2002)

Cube: The Linux First-Person Shooter
(Mon Oct 14, 2002)

How the press Spreads FUD
(Fri Oct 11, 2002)

Open Source Development with Perl, Python and DB2
(Fri Oct 11, 2002)

Automating Manufacturing Processes
(Fri Oct 11, 2002)

Making the Case for XFree86's Speed
(Fri Oct 11, 2002)

Sun Linux PCs
(Thu Oct 10, 2002)

Have It Your Way -- With Linux, of Course
(Thu Oct 10, 2002)

Tool of the Month: Ide.php
(Thu Oct 10, 2002)

Phoenix 0.2 Web Browser: Lean, Mean Mozilla
(Thu Oct 10, 2002)

Red Hat's UI Team on the Linux Desktop
(Thu Oct 10, 2002)

Get to Know Your Textutils
(Wed Oct 9, 2002)

Microsoft CTO talks about open source and security
(Wed Oct 9, 2002)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author