|Unix permissions are flexible and can solve almost any access control problem, but what about the ones they can't? Do you really want to make a group every time you want to share a file with another user? Perhaps you don't have root, and you can't create a group at will. Sometimes the limitations can cause security problems; it would be nice to be able to make a directory available to a web server or other user without making the files world-readable or world-writable. Root-owned configuration files often need to be edited by those without root privileges; instead of using programs like sudo or calife and risking shell escapes in editors, it would be better just to allow certain non-owners to edit these files.|
( Permalink: FreeBSD Access Control Lists Submitted by Dr.T Mon Aug 18, 2003 )
|Security Alerts talks about building a
"For small organizations, this may be easy --
nothing more then installing a honeypot on a single computer and placing it
on your local network. But what about organizations with hundreds of
networks and thousands of computers? How can honeypots be easily deployed
and managed in such large, distributed environments? One approach is
that you don't. Instead, you simply consolidate all of your honeypots in a single honeypot
farm, then you let the bad guys come to you."
( Permalink: Honeypot Farms Submitted by Noel Mon Aug 18, 2003 )
|Extend Eclipse's Java Development Tools|
|The refactoring capability of Eclipse's Java development environment is one of the most useful features it provides. *This article* will introduce you to the steps for creating your own refactoring as a natural extension of Eclipse. Portions of the solution presented in this article were excerpted from the recently published book, The Java Developer's Guide to Eclipse.|
( Permalink: Extend Eclipse's Java Development Tools Submitted by Anonymous Fri Aug 15, 2003 )
|Tux Makes Orbitz Fly High|
|Linux Planet brings us:
Tux Makes Orbitz Fly High.
"As e-commece technology and business models mature, many companies are re-examining the tools they initially used to open their virtual storefronts. One such e-firm is the travel mogul Orbitz, which recently made a major migration to Linux systems. Orbitz was started by a group of five airlines--American, Continental, Delta, Northwest and United--that worked together to develop a travel website that would serve people better than their individual efforts. "
( Permalink: Tux Makes Orbitz Fly High Submitted by Noel Fri Aug 15, 2003 )
|Nab Crackers With Snort|
|One of the first tools you want to have in your Linux security toolbox is the Snort intrusion detection system. In this Q&A, Rafeeq Ur Rehman describes the tools needed to build an IDS and the advantages of using the open-source IDS system on Linux.
( Permalink: Nab Crackers With Snort Submitted by Jan Stafford Fri Aug 15, 2003 )
|SCO to Argue General Public Licence Invalid|
|The Inquirer reports:
SCO to argue General Public Licence invalid.
"How does that work then? According to Heise, federal law only lets people make a single backup copy of software, and that makes the GPL void under US law."
( Permalink: SCO to Argue General Public Licence Invalid Submitted by Noel Fri Aug 15, 2003 )
|Browsing For A Browser|
|Processor.com brings us:
Browsing For A Browser.
"So at a time when the Linux desktop is poised to make serious inroads in organizations across the globe, IE on Windows will cease major improvements for some time. Meanwhile, the plethora of browsers on the Linux platform will continue their improvements unabated."
( Permalink: Browsing For A Browser Submitted by Noel Thu Aug 14, 2003 )
|Newsfactor talks about
"As more and more corporate applications become browser-based, Linux desktops will look more attractive, Murphy noted. But even in that case, companies tend to buy workstations with more capability than they need, and they still tend to have client applications they want to run. Even if Linux desktops get to a point where they can run Windows applications, the advantage gained by moving to Linux is still minimal, Murphy said."
( Permalink: Ximian Submitted by Noel Thu Aug 14, 2003 )
|Linmagau interviews Linux kernel maintainer
"Always system software, really. I did a lot of hardware design early on. Developer a couple of personal computers, wrote an OS and a real-time kernel. compilers, assemblers, linkers, interpreters, etc. Tons of stuff.
Working at the Nortel Wollongong lab was a great experience; being responsible for the delivery of five (or six) nines products to Telco customers, managing teams of up to 15 people, etc. I just learnt so much by observing the director down there, JB Clarke. He's brilliant."
( Permalink: Andrew Morton Submitted by Noel Thu Aug 14, 2003 )
|Detecting and Understanding Rootkits|
|You've installed the latest Linux distribution and stopped all unnecessary services. You have a set of Netfilter rules that would make the Pentagon Security Department envy you. You drool with delight. But...
( Permalink: Detecting and Understanding Rootkits Submitted by LogError Thu Aug 14, 2003 )
|Create a VNC system with tclRFB|
|This article takes a look at remote-control software's programmable side. Although VNC -- or Virtual Network Computing -- is widely used as a "productivity tool" for programmers and administrators, that's far from the limit of the technology's capabilities. tclRFB opens up a spectrum of possibilities for distributed architectures.|
( Permalink: Create a VNC system with tclRFB Submitted by Idean Wed Aug 13, 2003 )
|Stack Backtracing Inside Your Program|
|Linux Journal brings us:
Stack Backtracing Inside Your Program
"If you usually work with non-trivial C sources, you may have wondered which execution path (that is, which sequence of function calls) brought you to a certain point in your program. Also, it would be even more useful if you could have that piece of information whenever your beautiful, bug-free program suddenly crashes, and you have no debugger at hand. What is needed is a stack backtrace and, thanks to a little known feature of the GNU C library, obtaining it is a fairly easy task."
( Permalink: Stack Backtracing Inside Your Program Submitted by Noel Wed Aug 13, 2003 )
| Hats off to Fedora Package Manager|
|Newsforge tells us about
"Package management -- the way we install and maintain applications -- is a problem for many Linux users. One of the projects working on the problem is Fedora, a project that wants to be recognized as "the Debian of Red Hat."
( Permalink: Hats off to Fedora Package Manager Submitted by Noel Wed Aug 13, 2003 )
|SCO Execs Unloading Shares|
|Bloomberg News (from the The Salt Lake Tribune) is reporting that
SCO execs are unloading shares.
"SCO Group executives have sold about 119,000 shares of their company since it filed a lawsuit against IBM in March and the stock price increased more than fourfold"
( Permalink: SCO Execs Unloading Shares Submitted by Noel Wed Aug 13, 2003 )
|Twenty-First Century Rocket Science|
|O'Reilly takes a look at
"Why Unix? Because BLAST, like many other bioinformatics applications, was originally developed in Unix. It is the most common operating system for computational biology research. If you have a Windows PC, you can install one of the inexpensive Unix-like operating systems such as Linux or FreeBSD on a spare partition or drive."
( Permalink: Twenty-First Century Rocket Science Submitted by Noel Tue Aug 12, 2003 )