|O'Reilly talks about
"Let's begin by covering the current state of the anti-spam world. Since spam is such a widespread problem, there have been an increasing number of anti-spam measures devised in the last four years. Some measures involve legislation, some techniques require large groups of people, and some are simple techniques that individuals can use. I will cover some of the more popular defenses that individuals or administrators can implement on their own as well as mention a few of the up-and-coming systems. None of these systems is perfect. I do not claim that any of these will work without a hitch."
( Permalink: Defending Your Site Against Spam Submitted by Noel Mon Jun 30, 2003 )
|Wimbledon Scores With Linux|
|You can get all the Webledon Tennis Championship real-time scores with the IBM Real-Time Scoreboard, a standalone application that pushes point-by-point scoring information to tennis fans. Live scores are delivered directly to the users' desktop scoreboards as the scores change - every point, every match. It's a popular application: Tennis fans downloaded over 4.2 million IBM Real-Time Scoreboards in 2002. The Linux-based DB2 scoring database acts as a staging area that forms a critical link, a central data hub, in the information supply chain. Go here to get your Scoreboard and find out more about the technical aspects of the Linux based application.|
( Permalink: Wimbledon Scores With Linux Submitted by Anonymous Fri Jun 27, 2003 )
|Unix Shell Scripting Malware|
|Unix/Linux binary malware can be very dependent upon distribution flavour and kernel version. Furthermore, the use of binary files as a starting point for virus infection may not always be very successful - starting off with a coredump will result in a rapid failure. eBCVG Network Security |
( Permalink: Unix Shell Scripting Malware Submitted by Dr.T Fri Jun 27, 2003 )
|The Open Road: OpenBSD's Packet Filter|
|UnixReview: "Packet filtering is used to filter and manage TCP/IP traffic and also to perform Network Address Translation (NAT). So, if you want to set up an OpenBSD box as a firewall/router/gateway, you'll be using OpenBSD's Packet Filter. In this column, Zonker clarifies some of its complexities. " read|
( Permalink: The Open Road: OpenBSD's Packet Filter Submitted by Dr.T Fri Jun 27, 2003 )
|Better Java Garbage Collection with IBM's JDK 1.4.|
|This article discusses incremental compaction, a new feature in the memory management component of IBM JDK 1.4.0. Incremental compaction is a way of spreading compaction work across different garbage collection cycles, thereby reducing pause times. The authors discuss the need for incremental compaction, the compaction phases at a high level, and some runtime parameters. They also explain how to interpret changes in the verbosegc output.|
( Permalink: Better Java Garbage Collection with IBM's JDK 1.4. Submitted by Anonymous Wed Jun 25, 2003 )
|LastLog Editor - Unix LogFiles|
|This tutorial was written to show Unix users how to create a simlpe Unix LogFile editor. I decided to write this article, right after I have read the tutorial by pajka (hysteria.sk), which talks about Unix LogFiles. This tutorial gives detailed information about LastLog logging file, the structure of the log file and how to change user's entry. Of course, you are welcomed to try and build LogFiles editors for wtmp, utmp etc.
( Permalink: LastLog Editor - Unix LogFiles Submitted by Dr.T Wed Jun 25, 2003 )
|VMWare Workstation 4.0 Review|
|Roberto Dohnert reviews the Linux version of VMWare Workstation 4.0 for OSNews.|
( Permalink: VMWare Workstation 4.0 Review Submitted by Anonymous Tue Jun 24, 2003 )
|Taming Wi-Fi with New Security Bundles|
|Wi-Fi networks have, up until this point, been a bit like the Wild West: exciting, but difficult to control and keep safe. Now, a host of new management and security options are springing up as Wi-Fi penetrates corporate environments. This article reviews the next-generation enterprise Wi-Fi products that are designed to quell ongoing security fears.|
( Permalink: Taming Wi-Fi with New Security Bundles Submitted by Anonymous Tue Jun 24, 2003 )
|Public Key Infrastructure|
|Linux Planet talks about
"You may already be using PKI without knowing it if you have relied on certificates or "certs" to identify a web server or to confirm the identity of external websites. It is a critical technology for the Internet and is used in applications as diverse as e-commerce and VPNs. Let's explore the world of PKI cryptography to learn about keys, signatures, and certificates, and to see how PKI can benefit you and protect your company's valuable digital assets."
( Permalink: Public Key Infrastructure Submitted by Noel Tue Jun 24, 2003 )
|Book Review: Intrusion Detection with SNORT|
|When taking a look at the most used security tools, one of the most popular and praised ones is surely Snort. This heavily used product is an open source Network Intrusion Detection System and is available to anyone without any cost. The book I'm taking a look today is a guide through the Snort installation and usage the complete web server environment comprising of Apache, MySQL, PHP and ACID. Read more at Help Net Security.|
( Permalink: Book Review: Intrusion Detection with SNORT Submitted by LogError Tue Jun 24, 2003 )
|My Visit to SCO|
|Linux Journal tells us about Ian Lance Taylor's
visit to SCO.
"This essay describes my visit to SCO on June 17, 2003, to discuss SCO's claim that Linux infringes on its intellectual property rights. I visited the SCO office in Lindon, Utah, for about one hour. I spoke with Chris Sontag, Senior Vice President, Operating Systems Division, and with Blake Stowell, Director of Public Relations. In order to speak with them, I signed a non-disclosure agreement."
( Permalink: My Visit to SCO Submitted by Noel Mon Jun 23, 2003 )
|Tracking Down the Phantom Host|
|Security Focus brings us:
Tracking Down the Phantom Host.
"Most information systems security professionals are familiar with the procedures for identifying malicious traffic among their routine data, and many of the same professionals are familiar with the forensic procedures required once you have identified a compromised host. But on more than one occasion, I have been asked how to locate a problem host when you are not sure where it is physically located."
( Permalink: Tracking Down the Phantom Host Submitted by Noel Mon Jun 23, 2003 )
|Proxy Terminology 101|
|On Lamp introduces us to
"If you've ever accessed the Internet from an office environment, chances are your communications passed through a proxy. In the next few articles, I'll discuss the advantages of using a proxy and demonstrate the configuration of several proxies available from FreeBSD's ports collection."
( Permalink: Proxy Terminology 101 Submitted by Noel Mon Jun 23, 2003 )
|USENIX the Conference for Uber Geeks|
|Linux World talks about USENIX. Link is not working anymore try: http://www.usenix.org/.
"USENIX is that it is not a trade show. At USENIX you see a lot of programmers dressed in casual geek chic: shorts or jeans, lots of sandals (with or without socks), and t-shirts. Especially black t-shirts."
( Permalink: USENIX the Conference for Uber Geeks Submitted by Noel Mon Jun 23, 2003 )
|Interview with Solaris Kernel Engineer Andy Tucker|
|OSNews hosts an interview with Andy Tucker, Distinguished Engineer of the Solaris kernel. They talk about the internals of Solaris, the competition and how the OS compares to Linux/BSD/other-Unix and also about its future.|
( Permalink: Interview with Solaris Kernel Engineer Andy Tucker Submitted by Anonymous Fri Jun 20, 2003 )