|O'Reilly gets fancy with
"Five files in the CVSROOT directory of the repository enable you to run arbitrary scripts when a file is committed or tagged. Common uses for these files include interfacing CVS to a bug management system, a change tracker, or another tool; enforcing compliance with a project policy; and triggering processes such as automated export programs."
( Permalink: Running Arbitrary Scripts Under CVS Submitted by Noel Fri Jun 6, 2003 )
|Interview with Ximian's Nat Friedman|
|OSNews features a very interesting interview with Nat Friedman, of Ximian fame. Nat tells all and talks about the upcoming Ximian Desktop 2 and its differences from Gnome 2, the difficulties of developing the MS Exchange Connector, Linux as a desktop and its integration issues, Mono and plans for Gnome integration, the hundrends of OpenOffice.org changes made to make OOo like a Gnome2 app, and how Ximian feels... about Apple's business. Four screenshots of Ximian Desktop 2 are included too.|
( Permalink: Interview with Ximian's Nat Friedman Submitted by Anonymous Thu Jun 5, 2003 )
|Practical Database Design|
|This article on IBM developerWorks is the first in a two-part series on relational database fundamentals. The focus is on vendor independent Best Practices and recommendations. Part 1 discusses primary and foreign keys, as well as simple and complex data types.|
( Permalink: Practical Database Design Submitted by Anonymous Thu Jun 5, 2003 )
|Protecting Data with Norton Ghost 2003|
|Unix Review takes a look at
Norton Ghost 2003.
"The front of the
box reports that it works with "XP Home/XP Pro/2000 Pro/NT WS/Me/98" and
leaves Linux out of the equation altogether. Not surprisingly, Linux is
not mentioned anywhere on the box, and anyone who has worked with the
operating system for a while knows that the Window-ish interface shown on the back of the box as the GUI for the product is never going to pop
up under Red Hat."
( Permalink: Protecting Data with Norton Ghost 2003 Submitted by Noel Thu Jun 5, 2003 )
|In this weeks
Security Alerts, we look at problems in Apache,
PHP, CUPS, ghostscript, glibc, Apache Portable Runtime, gps, mod_gzip, Batalla Naval, and Xmame..
( Permalink: Apache Vulnerabilities Submitted by Noel Thu Jun 5, 2003 )
|Postfix with SASL Authentication over TLS|
|Daemon News tells us how to set up
Postfix with SASL Authentication over TLS.
"You may not know that your users send spam until you get on
the spamming list. I hope I don't have to explain why mechanisms such as:
identification, authentication and authorization have to be implemented. In
this article I will show you how to force users to authenticate before sending
mail through Postfix. Ready?"
( Permalink: Postfix with SASL Authentication over TLS Submitted by Noel Thu Jun 5, 2003 )
|CUPS - Common Unix Printing System|
|Slashdot reviews the book:
CUPS - Common Unix Printing System.
"However, if you are serious about printing, if you are considering replacing the outdated legacy printing system that came with your Unix or Linux or if you are a developer even remotely interested in Linux/Unix printing, this book is for you."
( Permalink: CUPS - Common Unix Printing System Submitted by Noel Wed Jun 4, 2003 )
|OpenBSD Gets Harder to Crack|
|eWeek takes a look at
"eWEEK Labs has used past versions of OpenBSD for a number of years in our lab for network firewalls as well as in OpenHack security tests and have come to trust the product's rock-solid reliability and secure-out-of-the-box configuration. It's free to download or $40 for a CD version."
( Permalink: OpenBSD Gets Harder to Crack Submitted by Noel Wed Jun 4, 2003 )
|Being Selective with MySQL|
|Unix Review talks about using SELECT in
"One of the most elementary statements in MySQL is the SELECT statement, used for querying a database. And yet, I regularly see questions posted on Usenet forums from people looking for assistance with some aspect of it. Since this is one of the first articles in this MySQL series, exploring the possibilities of SELECT should prove useful."
( Permalink: Being Selective with MySQL Submitted by Noel Wed Jun 4, 2003 )
|Humor: Hacker Haiku|
|Here are a few snapshots from a hacker's world captured in that tiniest of literary forms, haiku. Some express great sadness, such as this sample:|
"Overclock your box
it is very fast ... at first
warranty now void"
Here is the whole article.
( Permalink: Humor: Hacker Haiku Submitted by Anonymous Wed Jun 4, 2003 )
|Saving Our Bacon|
|O'Reilly brings us:
Saving Our Bacon: Snort Security Holes and Strategies for Safe Network Monitoring.
"In this article, I will review the attacks that have been launched against Snort in the past, as well as the recent (and more serious) buffer overflows. In each case, I'll discuss the ways Snort developers have responded to the attacks, and the strategies system administrators can take to minimize the risks."
( Permalink: Saving Our Bacon Submitted by Noel Wed Jun 4, 2003 )
|Review - Red Hat Linux Survival Guide|
|Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as others but it still covers a lot of material. Brought to you by the official Red Hat Press, it says to deliver practical advice to get you up and running in no time. Should you get this book? Read more at Help Net Security.|
( Permalink: Review - Red Hat Linux Survival Guide Submitted by LogError Mon Jun 2, 2003 )
|Hidden Treasures of the Perl Core|
|Perl.com tells us about the
hidden treasures of the Perl Core.
"The Perl Core comes with a lot of little modules to help you get thejob done. Many of these modules are not well-known. Even some of the well-known modules have some nice features that are often overlooked. In this article, we'll dive into many of these hidden treasures of the Perl Core."
( Permalink: Hidden Treasures of the Perl Core Submitted by Noel Mon Jun 2, 2003 )
|Doing It All with OpenSSH|
|Linux Journal tells us about
an open-source implementation of the secure shell protocol that comes
with almost every major Linux distribution. You can run out to www.openssh.org to get the latest and
greatest, but you probably already have it on your system. That said,
keeping up to date with the latest version of OpenSSH is essential if
you want to maintain security. So, if your version of OpenSSH is more than
a few months old, you may want to consider checking for an update."
( Permalink: Doing It All with OpenSSH Submitted by Noel Mon Jun 2, 2003 )
|Novell's New Identity|
|Alwayson talks to
Chris Stone, Vice Chairman of Novell.
"At BrainShare, we announced that in NetWare 7.0, we are going to give our customers a choice between the NetWare kernel or a Linux kernel. We can do this because we have a large support infrastructure."
( Permalink: Novell's New Identity Submitted by Noel Mon Jun 2, 2003 )