# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Defending Your Site Against Spam
O'Reilly talks about Spam.
"Let's begin by covering the current state of the anti-spam world. Since spam is such a widespread problem, there have been an increasing number of anti-spam measures devised in the last four years. Some measures involve legislation, some techniques require large groups of people, and some are simple techniques that individuals can use. I will cover some of the more popular defenses that individuals or administrators can implement on their own as well as mention a few of the up-and-coming systems. None of these systems is perfect. I do not claim that any of these will work without a hitch."

( Permalink: Defending Your Site Against Spam      Submitted by Noel Mon Jun 30, 2003 )

Wimbledon Scores With Linux
You can get all the Webledon Tennis Championship real-time scores with the IBM Real-Time Scoreboard, a standalone application that pushes point-by-point scoring information to tennis fans. Live scores are delivered directly to the users' desktop scoreboards as the scores change - every point, every match. It's a popular application: Tennis fans downloaded over 4.2 million IBM Real-Time Scoreboards in 2002. The Linux-based DB2 scoring database acts as a staging area that forms a critical link, a central data hub, in the information supply chain. Go here to get your Scoreboard and find out more about the technical aspects of the Linux based application.

( Permalink: Wimbledon Scores With Linux      Submitted by Anonymous Fri Jun 27, 2003 )

Unix Shell Scripting Malware
Unix/Linux binary malware can be very dependent upon distribution flavour and kernel version. Furthermore, the use of binary files as a starting point for virus infection may not always be very successful - starting off with a coredump will result in a rapid failure. eBCVG Network Security

( Permalink: Unix Shell Scripting Malware      Submitted by Dr.T Fri Jun 27, 2003 )

The Open Road: OpenBSD's Packet Filter
UnixReview: "Packet filtering is used to filter and manage TCP/IP traffic and also to perform Network Address Translation (NAT). So, if you want to set up an OpenBSD box as a firewall/router/gateway, you'll be using OpenBSD's Packet Filter. In this column, Zonker clarifies some of its complexities. " read

( Permalink: The Open Road: OpenBSD's Packet Filter      Submitted by Dr.T Fri Jun 27, 2003 )

Better Java Garbage Collection with IBM's JDK 1.4.
This article discusses incremental compaction, a new feature in the memory management component of IBM JDK 1.4.0. Incremental compaction is a way of spreading compaction work across different garbage collection cycles, thereby reducing pause times. The authors discuss the need for incremental compaction, the compaction phases at a high level, and some runtime parameters. They also explain how to interpret changes in the verbosegc output.

( Permalink: Better Java Garbage Collection with IBM's JDK 1.4.      Submitted by Anonymous Wed Jun 25, 2003 )

LastLog Editor - Unix LogFiles
This tutorial was written to show Unix users how to create a simlpe Unix LogFile editor. I decided to write this article, right after I have read the tutorial by pajka (hysteria.sk), which talks about Unix LogFiles. This tutorial gives detailed information about LastLog logging file, the structure of the log file and how to change user's entry. Of course, you are welcomed to try and build LogFiles editors for wtmp, utmp etc. article

( Permalink: LastLog Editor - Unix LogFiles      Submitted by Dr.T Wed Jun 25, 2003 )

VMWare Workstation 4.0 Review
Roberto Dohnert reviews the Linux version of VMWare Workstation 4.0 for OSNews.

( Permalink: VMWare Workstation 4.0 Review      Submitted by Anonymous Tue Jun 24, 2003 )

Taming Wi-Fi with New Security Bundles
Wi-Fi networks have, up until this point, been a bit like the Wild West: exciting, but difficult to control and keep safe. Now, a host of new management and security options are springing up as Wi-Fi penetrates corporate environments. This article reviews the next-generation enterprise Wi-Fi products that are designed to quell ongoing security fears.

( Permalink: Taming Wi-Fi with New Security Bundles      Submitted by Anonymous Tue Jun 24, 2003 )

Public Key Infrastructure
Linux Planet talks about Public Keys.
"You may already be using PKI without knowing it if you have relied on certificates or "certs" to identify a web server or to confirm the identity of external websites. It is a critical technology for the Internet and is used in applications as diverse as e-commerce and VPNs. Let's explore the world of PKI cryptography to learn about keys, signatures, and certificates, and to see how PKI can benefit you and protect your company's valuable digital assets."

( Permalink: Public Key Infrastructure      Submitted by Noel Tue Jun 24, 2003 )

Book Review: Intrusion Detection with SNORT
When taking a look at the most used security tools, one of the most popular and praised ones is surely Snort. This heavily used product is an open source Network Intrusion Detection System and is available to anyone without any cost. The book I'm taking a look today is a guide through the Snort installation and usage the complete web server environment comprising of Apache, MySQL, PHP and ACID. Read more at Help Net Security.

( Permalink: Book Review: Intrusion Detection with SNORT      Submitted by LogError Tue Jun 24, 2003 )

My Visit to SCO
Linux Journal tells us about Ian Lance Taylor's visit to SCO.
"This essay describes my visit to SCO on June 17, 2003, to discuss SCO's claim that Linux infringes on its intellectual property rights. I visited the SCO office in Lindon, Utah, for about one hour. I spoke with Chris Sontag, Senior Vice President, Operating Systems Division, and with Blake Stowell, Director of Public Relations. In order to speak with them, I signed a non-disclosure agreement."

( Permalink: My Visit to SCO      Submitted by Noel Mon Jun 23, 2003 )

Tracking Down the Phantom Host
Security Focus brings us: Tracking Down the Phantom Host.
"Most information systems security professionals are familiar with the procedures for identifying malicious traffic among their routine data, and many of the same professionals are familiar with the forensic procedures required once you have identified a compromised host. But on more than one occasion, I have been asked how to locate a problem host when you are not sure where it is physically located."

( Permalink: Tracking Down the Phantom Host      Submitted by Noel Mon Jun 23, 2003 )

Proxy Terminology 101
On Lamp introduces us to proxies.
"If you've ever accessed the Internet from an office environment, chances are your communications passed through a proxy. In the next few articles, I'll discuss the advantages of using a proxy and demonstrate the configuration of several proxies available from FreeBSD's ports collection."

( Permalink: Proxy Terminology 101      Submitted by Noel Mon Jun 23, 2003 )

USENIX the Conference for Uber Geeks
Linux World talks about USENIX. Link is not working anymore try: http://www.usenix.org/.
"USENIX is that it is not a trade show. At USENIX you see a lot of programmers dressed in casual geek chic: shorts or jeans, lots of sandals (with or without socks), and t-shirts. Especially black t-shirts."

( Permalink: USENIX the Conference for Uber Geeks      Submitted by Noel Mon Jun 23, 2003 )

Interview with Solaris Kernel Engineer Andy Tucker
OSNews hosts an interview with Andy Tucker, Distinguished Engineer of the Solaris kernel. They talk about the internals of Solaris, the competition and how the OS compares to Linux/BSD/other-Unix and also about its future.

( Permalink: Interview with Solaris Kernel Engineer Andy Tucker      Submitted by Anonymous Fri Jun 20, 2003 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Mail Filtering
(Fri Aug 30, 2002)

OpenPKG 1.1 Released
(Thu Aug 29, 2002)

Lobbying for Insecurity
(Thu Aug 29, 2002)

Michael Simms
(Thu Aug 29, 2002)

wget and Debian 3.0
(Thu Aug 29, 2002)

Installing Red Hat 7.3 on a Compaq Laptop
(Thu Aug 29, 2002)

Intel Pentium 4 2.8Ghz Review
(Wed Aug 28, 2002)

Justifying the Expense of IDS
(Wed Aug 28, 2002)

Remote Administration of Linux Systems
(Wed Aug 28, 2002)

Bugzilla Security Problems
(Wed Aug 28, 2002)

Getting Started with Java on Linux
(Wed Aug 28, 2002)

Adios, Caldera; Hello, SCO Group
(Tue Aug 27, 2002)

An Unauthorized Biography of RMS
(Tue Aug 27, 2002)

StarOffice 6.0
(Tue Aug 27, 2002)

Mac OS X 10.2 Jaguar
(Tue Aug 27, 2002)

Easily Compile and Configure Samba
(Tue Aug 27, 2002)

A Story of Success, Sadness, and Open Source
(Mon Aug 26, 2002)

Favorite Minimalist File Managers
(Mon Aug 26, 2002)

Archiving With Pax
(Mon Aug 26, 2002)

APT vs RPM: Well, None of the Two
(Mon Aug 26, 2002)

Role-Based Access Control in Solaris
(Mon Aug 26, 2002)

Vi IMproved -- Vim
(Fri Aug 23, 2002)

How To Create Favicon-Icons On Unix
(Fri Aug 23, 2002)

Mac OS X Switcher Stories
(Fri Aug 23, 2002)

Interview with Shawn Gordon of TheKompany
(Fri Aug 23, 2002)

Book review - Web Hacking: Attacks and Defense
(Fri Aug 23, 2002)

Web Basics with LWP
(Thu Aug 22, 2002)

Interview with Bill Kendrick of NewBreedSoftware
(Thu Aug 22, 2002)

Yes You Can
(Thu Aug 22, 2002)

Introduction to Autorooters
(Thu Aug 22, 2002)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author