# RootPrompt.org   Nothing but Unix.[Home] [Features] [Programming] [Mac OS X] [Search]

Honeypots: Are They Illegal?
Lance Spitzner askes: Honeypots: Are They Illegal?
"As honeypots and their concepts have grown more popular, people have begun to ask what legal issues could apply. The purpose of this paper is to address the most commonly asked issues. The concepts covered here will be focusing on US statutes, not international, mainly because I'm only familiar with US law. However, these concepts most likely also play some role in the international community."

( Permalink: Honeypots: Are They Illegal?      Submitted by Noel Mon Jun 16, 2003 )

Privacy and Anonymity in Email
On Lamp talks about privacy and anonymity in email.
"As convenient as email is, it leaves much to be desired in terms of protecting the privacy of messages. There are two aspects to the limitation. On the one hand, email messages are very susceptible to interception and tampering by a variety of parties (ISPs, hackers, government, spammers, and others). On the other hand, email does not directly provide for anonymous communication (an important bastion of freedom of expression)."

( Permalink: Privacy and Anonymity in Email      Submitted by Noel Fri Jun 13, 2003 )

Linux at the (Server)Beach
Linux Planet brings us: Linux at the (Server)Beach.
"And yet, when ServerBeach makes such a claim, it actually does go a bit beyond the ho-hum, another day, another Tux convert. Because what this ISP is doing with Linux realizes some of the full potential of the operating system not just as a network administration platform but also as a configurable resource."

( Permalink: Linux at the (Server)Beach      Submitted by Noel Fri Jun 13, 2003 )

Planning for Survivable Networks
Slashdot reviews the book: Planning for Survivable Networks.
"It's a practical book, but also a surprisingly uplifting book, considering its technical content. I truly enjoyed reading about the adaptable human spirit that enabled managers and workers to keep their businesses going after the 9/11 attacks."

( Permalink: Planning for Survivable Networks      Submitted by Noel Fri Jun 13, 2003 )

Did SCO Open Unix Source Code?
CNet talks about the SCO lawsuit.
"But Moglen disagrees with SCO's position. "I find these statements from SCO irresponsible," he said. The act of packaging, advertising and marketing a Linux product means SCO's actions were anything but inadvertent, he said. What SCO is arguing seems instead to be that it didn't know what it was packaging."

( Permalink: Did SCO Open Unix Source Code?      Submitted by Noel Fri Jun 13, 2003 )

Improving the Ultimate Linux Box
Linux Journal tells us how they improved the ultimate Linux box.
"Things were similar in the random read department; I ended up with a 3.70 to 2.17 advantage at 8 threads. At only 2 threads, though, the advantage wasn't much. SCSI still owns the random writes department with a steady 30something mb/sec rate--until you get to 8 threads. Then, the ULB edges out at 21.87 to 18.76; this is a drastic improvement over the 10-13mb/sec rate achieve with the old configuration."

( Permalink: Improving the Ultimate Linux Box      Submitted by Noel Fri Jun 13, 2003 )

Using Slackware Linux as a Live CD Toolbox
OSNews features an article showing how you can create a Live CD with Slackware Linux.

( Permalink: Using Slackware Linux as a Live CD Toolbox      Submitted by Anonymous Thu Jun 12, 2003 )

Linux Access in State and Local Government
Linux Journal brings us: Linux Access in State and Local Government.
"This year, Oregon and Texas legislators introduced house and senate bills respectively supporting open-source software. Both legislative bills made their way to committee hearings, but the results differed significantly. Oregon's HB 2892 died. In Texas, SB 1579 found favor in the Committee and remains pending due to a walkout by approximately 50 members of the House."

( Permalink: Linux Access in State and Local Government      Submitted by Noel Thu Jun 12, 2003 )

James the Java Apache Mail Enterprise Server
These articles form a two-part series on the Java Apache Mail Enterprise Server, also known as James. The first article provides a high-level overview, briefly touching on the Apache group's design objectives, and describes how to install and configure a workable development environment. In the second article, you will be taken beyond the basic James infrastructure and implement a practical application for flagging users as available or unavailable, and for automatically sending custom messages to senders from users who chose to make themselves unavailable. These articles lay a foundation for understanding James and for developing server-side e-mail applications.

( Permalink: James the Java Apache Mail Enterprise Server      Submitted by Anonymous Thu Jun 12, 2003 )

Reconstructing RPMs
Unix Review talks about reconstructing RPMs.
"This month, I'm going to talk about a nifty program I found on Freshmeat not long ago. rpmrebuild. This is one program that I wish I'd had years ago. As the name suggests, it's a tool for rebuilding RPMs, which it does by reconstructing the package from files installed on your system and information in the RPM database."

( Permalink: Reconstructing RPMs      Submitted by Noel Thu Jun 12, 2003 )

SEGA Dreamcast into a Linux Firewall
Linux Devices tells us how to turn the SEGA Dreamcast into a Linux firewall/router.
"This highly detailed 101-page how-to article provides the necessary background and procedures to turn a SEGA Dreamcast gaming console into a Linux-based software router with firewalling and virtual private networking capabilities. The article explains how to create the necessary toolchain for compiling both programs and the Linux kernel, and shows how, starting from scratch, you can build a Linux operating system that runs entirely in memory."

( Permalink: SEGA Dreamcast into a Linux Firewall      Submitted by Noel Thu Jun 12, 2003 )

Scanning Networks
"Scanning helps one to know what services are running on a machine. This will show the open ports on which services are listening for connections. First we will determine whether the target machine is alive or not. This can be done by sending a icmp echo request packet to the server. The server would respond with a icmp echo reply showing that itís alive. The process to do this on a range of hosts or ipaddresses is known as ping sweep. Of the many methods used, we will look on ICMP ping and echo port ping. " article

( Permalink: Scanning Networks      Submitted by Dr.T Wed Jun 11, 2003 )

Embedded Systems, Linux, and the Future
O'Reilly brings us: Embedded Systems, Linux, and the Future.
"Predicting the future is a tricky endeavor, and an often-failed one, at that. So I won't try to predict the future in this article. Instead, I will present how the traditional players of the embedded systems field are currently positioned, what impact Linux is having, and what forces will decide where the field is going."

( Permalink: Embedded Systems, Linux, and the Future      Submitted by Noel Wed Jun 11, 2003 )

Opera is Better Than Godounov
Linux World talks about Opera.
"Opera is $39 if you want to buy it. It's not worth purchasing just to get rid of its embedded banner ad, but Our Hero thinks it is well worth the money for other reasons."

( Permalink: Opera is Better Than Godounov      Submitted by Noel Wed Jun 11, 2003 )

Introduction and History of Darwin
OSNews features an article introducing the Darwin, where it came from, the technologies used behind it, the Open Darwin and Gnu Darwin distributions, how the Darwin architecture is evolving and where it is going.

( Permalink: Introduction and History of Darwin      Submitted by Anonymous Wed Jun 11, 2003 )

Featured Articles:
Unix and Linux Podcasting Guide

Expect and SSH

The Linux Enterprise Cluster

Book Review: Podcasting: Do-It-Yourself Guide

Remote Backups With Rsync

Weakness and Security

Essential CVS

Spring Into Technical Writing

Other News:
Biodiesel Resources

Older News

Athlon XP 2600+
(Thu Aug 22, 2002)

Developing and Testing a Complete J2EE Application
(Wed Aug 21, 2002)

Tomcat and Apache Via the mod_jk Module
(Wed Aug 21, 2002)

Tinydns: Kiss Your BIND Good-bye
(Wed Aug 21, 2002)

Cooking with Linux: The Ultimate (but Small) Linux
(Wed Aug 21, 2002)

Review: Sophos Anti-Virus for Unix
(Wed Aug 21, 2002)

PHP References
(Tue Aug 20, 2002)

Linux Books: The Best and the Brightest
(Tue Aug 20, 2002)

A Linux You Can Try Before You Even Install It
(Tue Aug 20, 2002)

IBM's Linux Tech Chief
(Tue Aug 20, 2002)

LPI Certification 101 Exam Prep, Part 1: Linux Fun
(Mon Aug 19, 2002)

Configuring IPsec/IKE on Solaris
(Mon Aug 19, 2002)

Using Groups to Eliminate Root
(Mon Aug 19, 2002)

Mastering Linux Debugging Techniques
(Mon Aug 19, 2002)

Power PC Assembly
(Mon Aug 19, 2002)

Is Windows or Linux Easier to Install?
(Fri Aug 16, 2002)

Developing Gnome Apps with Glade and Anjuta
(Fri Aug 16, 2002)

SSH Public-Key Authentication
(Fri Aug 16, 2002)

Big Blue Eats Its Own Linux
(Fri Aug 16, 2002)

Review of WalMart's Mandrake/Microtel PC
(Fri Aug 16, 2002)

Linux and The Mattel Powerglove
(Thu Aug 15, 2002)

Scott McNeil & Mike Angelo Discuss Linux Standard
(Thu Aug 15, 2002)

Finding Broken Links with linkcheck.pl
(Thu Aug 15, 2002)

Getting Started With FreeVSD
(Thu Aug 15, 2002)

Climbing the Kernel Mountain
(Thu Aug 15, 2002)

Cryptography, Encryption, and Cryptology Explained
(Wed Aug 14, 2002)

OEone's Linux Desktop
(Wed Aug 14, 2002)

Tool of the Month: MlView
(Wed Aug 14, 2002)

PGP, GPG Defeated
(Wed Aug 14, 2002)

A Look at Multihoming and BGP
(Wed Aug 14, 2002)

[Latest News] [Newer News] [Older News]

Our content can be syndicated: Main Page Mac Page
(Validate RSS code)

Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author