|Extreme Programming (XP) founder Kent Beck likes to say he made up XP's fundamentals during a particularly troubled project in 1996. While strictly true, from talking to him you sense he'd really been formulating the process for quite some time. Find out what Kent thinks about the contribution of the Java platform to software development's success (or lack thereof). In this interview he explains how better applications can arise from the ashes of failure.|
( Permalink: Interview with XP Founder Kent Beck Submitted by Anonymous Fri Jun 20, 2003 )
|Virtual File System - /proc|
|This article gives a brief overview on the /proc file system. It explains how to gather information using /proc and how to change system information (shortly explained). The article mostly focuses on important parts of /proc and less on others. Even though it is a short article, it provides good information for any UNIX-based operating system user.
( Permalink: Virtual File System - /proc Submitted by Dr.T Fri Jun 20, 2003 )
|Introducing the LinuxInstall Distribution|
|This article is a review of Linuxinstall.org 3.0, a Redhat 8.0 based distro aimed at the new home user.|
( Permalink: Introducing the LinuxInstall Distribution Submitted by Anonymous Thu Jun 19, 2003 )
|Slashdot reviews the book:
"I had trouble giving Special Ops a rating of 9 or 10 for a few reasons. Even though the book is an easy read, it's a lot of information to digest. The subtitle makes it sound as if Microsoft, UNIX, and Oracle would receive equal treatment: not so. While there are 7 chapters on Microsoft specific technologies, UNIX and Oracle rate one chapter each. I would have preferred to see Special Ops split into 2 or 3 books, giving equal attention to all of the technologies."
( Permalink: Special Ops Submitted by Noel Wed Jun 18, 2003 )
|Penetration Testing for Web Applications|
|Security Focus tells us about
Penetration Testing for Web Applications.
"This is the first in a series of three articles on penetration testing for Web applications. The first installment provides the penetration tester with an overview of Web applications - how they work, how they interact with users, and most importantly how developers can expose data and systems with poorly written and secured Web application front-ends."
( Permalink: Penetration Testing for Web Applications Submitted by Noel Wed Jun 18, 2003 )
|Using the xargs Command|
|Unix Review tells us how to use the
"... will potentially overflow the command line given enough files. This command provides a list of all the files edited today to pr, and pipes pr's output to the printer. We can solve this problem with xargs:"
( Permalink: Using the xargs Command Submitted by Noel Wed Jun 18, 2003 )
|More Kernel Trouble|
|In this weeks
Security Alerts, we look at problems in Linux kernels, GNU Zip, xaos, Speak Freely, eterm, Hangul Terminal, typespeed, mikmod, kon2, zblast/xzb, and zenTrack. |
( Permalink: More Kernel Trouble Submitted by Noel Wed Jun 18, 2003 )
|SCO's Evidence Unveiled?|
|The Inquirer reports SCO's evidence unveiled: |
"There's a story on the World Wide Web by a German chap who claims that he's managed to look at SCO's evidence about Linux, without having to sign one of those very irritating non disclosure agreement (NDA) documents."
Here you can find the German page translated in English
( Permalink: SCO's Evidence Unveiled? Submitted by fabiuzzz Tue Jun 17, 2003 )
|Review of Ximian Desktop 2 on Red Hat Linux 9|
|A user describes his adventures installing Ximian Desktop 2 and then reviews the actual desktop.|
( Permalink: Review of Ximian Desktop 2 on Red Hat Linux 9 Submitted by Anonymous Tue Jun 17, 2003 )
|Internet for Disadvantaged Miami Kids |
|Newsforge tells us about a
one-day Linux project that is bringing the Internet to disadvantaged Miami kids.
"Miami's Liberty City is one of the worst neighborhoods in a city famous for bad neighborhoods. The Liberty City Learning Center is a privately-run effort to help neighborhood children break the cycle of ignorance that keeps them there. And now, thanks to volunteers from two Florida Linux user groups and hardware donations from local businesses, Liberty City Learning Center can add computer and Internet training to its curriculum."
( Permalink: Internet for Disadvantaged Miami Kids Submitted by Noel Tue Jun 17, 2003 )
|Emulate Legacy Operating Systems on Linux|
|This article shows you how Linux is used to emulate a wide variety of operating systems. More than mere academic exercises, these "hosted OSes" are practical investments for many server rooms. One of the best things to do with a Linux box is to run programs for other operating systems on it. It can simplify your life considerably.|
( Permalink: Emulate Legacy Operating Systems on Linux Submitted by Anonymous Tue Jun 17, 2003 )
|Is Sun the Mystery Licensee for SCO?|
Okay, this is speculative at the moment, and I have no confirming answers to the contrary, but I believe the other mystery licensee to the SCO license may be none other than Sun Microsystems. Again, I have no proof of this fact, but the SCO actions point to this possibility and so do some of the Sun Microsystems actions.
Interestingly enough, that mystery silent licensee has not been named in so many words, but Chris Sontag's declaration that Sun Microsystems has paid SCO $100 Million dollars in licensing revenues sure seems odd for a company that should not be paying SCO any fees.
( Permalink: Is Sun the Mystery Licensee for SCO? Submitted by Agent Orange Mon Jun 16, 2003 )
|Slash'EM: The Sum of All NetHacks|
|O'Reilly brings us:
Slash'EM: The Sum of All NetHacks.
"Slash'EM most noticeably extends the simple glyphs that NetHack uses
for its graphics with several more attractive tilesets. But the real
difference between it and many NetHack window interfaces lies beneath such
superficialities. Slash'EM alters the original's game play..."
( Permalink: Slash'EM: The Sum of All NetHacks Submitted by Noel Mon Jun 16, 2003 )
|Ximian Desktop 2|
|Warcry looks at
Ximian Desktop 2.
"First impressions were of the clean interface it provided just like Windows XP you start out with a mostly blank desktop. So what did that leave me with I wondered. The answer is whole lot as many people will discover."
( Permalink: Ximian Desktop 2 Submitted by Noel Mon Jun 16, 2003 )
|Linux World tells us about the game Enemy Territory. (Link no longer works try http://www.enemy-territory.com/
"Some people say that ET is a mod of Return to Castle Wolfenstein (RTCW) that has somehow morphed its way into becoming a standalone game. Others say that it is still just a mod of RTCW, but a full conversion mod. I don't know enough about it to argue one way or the other, but here is what I do know. ET is based on RTCW. The game play is very similar. However, you don't need RTCW to play ET, and as noted above, you can download the full version for free."
( Permalink: Enemy Territory Submitted by Noel Mon Jun 16, 2003 )