|The Java platform has traditionally prided itself on its platform independence. While that independence has many benefits, it makes the process of writing Java applications that interact with hardware quite tricky. In this article, a research scientist examines two projects that are making the process easier by providing APIs through which Java applications can make use of USB devices. While both projects are still in embryo form, both show promise and are already serving as the foundations of some real-world applications.|
( Permalink: Access USB Devices from Java Applications Submitted by Bob Fri Sep 5, 2003 )
|Boscov Inches Into Linux|
|Linux Planet tells us about Linux use by
"Successful Linux deployments sometimes happen gradually. Boscov's, a Linux pioneer in the department store space, is a great case in point. The $1 billion regional retailer already uses Linux to run Apache, Radius, GNU Privacy Guard (GPG), IBM Tivoli's NetView, AcuCobol, special invoicing software, and Linuxcare's Levanta 2.0, among other apps and services."
( Permalink: Boscov Inches Into Linux Submitted by Noel Fri Sep 5, 2003 )
|Book Review: Absolute OpenBSD|
|OpenBSD packages a unique combination of security and usability. While I don't agree with Absolute OpenBSD's back cover when it gushes that "OpenBSD is the most secure operating system in the world" — I can make arguments for Multics, QNX, OS/400, Plan 9, and more — there's no denying that OpenBSD's security profile is far stronger than that of any of its direct competitors, certainly more "than any variety of Linux or Windows."
( Permalink: Book Review: Absolute OpenBSD Submitted by Danny Fri Sep 5, 2003 )
|Opinion - SCO vs. IBM|
|Bob Toxen, the author of "Real World Linux Security: Intrusion Prevention, Detection, and Recovery", gives his take on the SCO situation.
( Permalink: Opinion - SCO vs. IBM Submitted by LogError Thu Sep 4, 2003 )
|GUI vs. CLI: A Qualitative Comparison|
|In this article, I will be analyzing the specific properties that make the command line unique and irreplaceable. I will likewise analyze the graphical UI's features--though only giving it a cursory look, since I assume my audience does not need to be persuaded to make the most of its video hardware. I will be looking at the Unix shell, since it is the most full-featured and powerful of such interfaces (DOS, of course, had very few features worth talking about; it must be given its due, though--it brought millions of people into computing). I will be looking at GUIs on a more general level. Read the interesting comparison at OSNews by Greg Afinogenov.|
( Permalink: GUI vs. CLI: A Qualitative Comparison Submitted by Anonymous Thu Sep 4, 2003 )
|Installing XFce-4 on SuSE 8.2|
|This guide will introduce you to XFce, the popular (ex-CDE-inspired) Unix/X11 graphical environment, and it will give you pointers how to install it. |
( Permalink: Installing XFce-4 on SuSE 8.2 Submitted by Anonymous Thu Sep 4, 2003 )
|Server Clinic: R Handy for Crunching Data|
|Learn about good choices for sophisticated statistical processing. R is sophisticated open-source software for managing statistical calculations. It's easy enough to use that it can benefit you even if you need only a fraction of its capabilities.|
( Permalink: Server Clinic: R Handy for Crunching Data Submitted by Bob Wed Sep 3, 2003 )
|Cisco Security Specialist's Guide to PIX Firewalls|
|I expected that this book would give me what I was looking for out of a product-specific book, excellent coverage of the product and its features. It was all that and then some. I was thoroughly impressed with the coverage in this text. This book is perfect for anyone looking to gain familiarity with the Cisco PIX. It's also great for those looking to find solutions for existing PIX implementations. The main focus of this book is to prepare individuals for the corresponding exam as mentioned above. Without further delay, let's take a look at what's inside.|
( Permalink: Cisco Security Specialist's Guide to PIX Firewalls Submitted by Dr.T Wed Sep 3, 2003 )
|Red Hat Enterprise Linux 2.95 AS Beta Preview|
|Red Hat released the beta for their upcoming Red Hat Enterprise Linux (RHEL) line recently (v2.95, Taroon) and OSNews sports a preview of this "high-end" Linux version of Red Hat. The article mentions the extra features you can find on this Enterprise version (e.g. the inclusion of the Eclipse IDE, Tomcat etc) and how it compares to its previous version.|
( Permalink: Red Hat Enterprise Linux 2.95 AS Beta Preview Submitted by Anonymous Wed Sep 3, 2003 )
|Secure Programmer: Developing Secure Programs|
|This column explains how to write secure applications; it focuses on the Linux operating system, but many of the principles apply to any system. In today's networked world, software developers must know how to write secure programs, yet this information isn't widely known or taught. This first installment of the Secure programmer column introduces the basic ideas of how to write secure applications and discusses how to identify the security requirements for your specific application. Future installments will focus on different common vulnerabilities and how to prevent them.|
( Permalink: Secure Programmer: Developing Secure Programs Submitted by Idean Thu Aug 28, 2003 )
|In this weeks
we look at problems in BitKeeper, the GNOME Display Manager, rcpd, ViRobot Linux Server,
OpenSLP, eMule, lMule, xMule, netris, and autorespond. |
( Permalink: GNOME Trouble Submitted by Noel Thu Aug 28, 2003 )
|Wireless on Linux, Part 1|
|"For the harassed, overworked network admin, connecting new clients without having to run additional cabling is so much fun it feels wrong. Miles of pretty color-coded cables and tags are aesthetically pleasing and useful, of course, and who hasn't experienced the satisfaction of crimping connectors? There's nothing like the authoritative SNICK of a perfect crimp. (For some of us deskbound-geeks, grip strength is all we have.)"
( Permalink: Wireless on Linux, Part 1 Submitted by Danny Wed Aug 27, 2003 )
|Perens: IT Pros Must Lobby for Open Source|
|Open-source pioneer and evangelist Bruce Perens urges IT managers to lobby for the protection of open-source software from the infringing threat of software patents and legal liability.
Read the short interview
( Permalink: Perens: IT Pros Must Lobby for Open Source Submitted by Jan Stafford Wed Aug 27, 2003 )
|How Secure is Your Wireless Network?|
|Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP said - "Using a wireless netwok for mission-critical data is plain stupid. Using it for life-critical data is criminally negligent". Will this book help you secure your wireless LAN? Read on to find out.
( Permalink: How Secure is Your Wireless Network? Submitted by LogError Wed Aug 27, 2003 )
|The Simplicity of Sockets|
|Randal Schwartz tells us about using
sockets in PERL.
"To Perl, a socket is presented as a filehandle, and is read and written using ordinary filehandle operations. Just as a phone might be identified by its phone number, a socket is identified using its Internet (IP) address and port number."
( Permalink: The Simplicity of Sockets Submitted by Noel Mon Aug 25, 2003 )