|Unix Review talks about
OpenBSD security, more XFree, expanding UML filesystems.
"Naturally, the guest UML system can't be running while you're making changes to its filesystem If you're paranoid, you might also want to make a quick copy of the filesystem before expanding it."
( Permalink: OpenBSD Security, XFree, UML Filesystems Submitted by Noel Wed May 28, 2003 )
|Rolling ROCK Magazine Issue #2 2003|
|ROCK Linux, the Linux Distribution Build Kit, announces the publication of the 2nd issue this year of Rolling ROCK, our online magazine. It can be found at:
( Permalink: Rolling ROCK Magazine Issue #2 2003 Submitted by jocelyn Tue May 27, 2003 )
|Dial Out Connection in FreeBSD|
|Configuring the ppp-Dial out Connection in FreeBSD. The following are tips to getting your host to be able to connect over the modem to Internet Service Provider (ISP).
( Permalink: Dial Out Connection in FreeBSD Submitted by Dr.T Tue May 27, 2003 )
|Polishing Your Linux Laptop Setup|
|Linux Journal tells us how to
polish our Linux Laptop setup.
"In my past laptop oriented articles, I talked about procedures for installing a base Linux system and setting up GNOME 2.2. This time around, I discuss a few odds and ends that did not quite fit those other two articles but definitely deserve further attention."
( Permalink: Polishing Your Linux Laptop Setup Submitted by Noel Tue May 27, 2003 )
|O'Reilly tells us about the history of
"Email's mode of transmission is based on 7-bit ASCII. In other words, early Internet communication was only 128 characters - specifically numbers and letters - that we use in English. Hence no Icelandic, Chinese, Hebrew or Greek, to name a few languages. Also, there were no pictures, or sound clips. The only messages sent were English text."
( Permalink: Command-Line Email Submitted by Noel Tue May 27, 2003 )
|Building An Open Source Office|
|The LINC Project talks about using open source for your
"The Low Income Networking and Communications (LINC) Project of the Welfare Law Center has helped over 40 low-income led organizing groups use technology more effectively. When we learned of Microsoft's decision to discontinue support of their older operating systems, including Windows 95, we began to explore the idea of using GNU/Linux, a free operating system that works well with older computers."
( Permalink: Building An Open Source Office Submitted by Noel Tue May 27, 2003 )
|Review - UNIX: Visual QuickStart Guide|
|There's a myriad of online documentation and books out there that can help you get into UNIX. This book is different as it concentrates on teaching using a lot of screenshots which makes it one of the best resources for beginners. What does it offer exactly? Read on to find out.
( Permalink: Review - UNIX: Visual QuickStart Guide Submitted by LogError Mon May 26, 2003 )
|Unix Review reviews the
CodeWeavers CrossOver Plugin.
"The initial release of Crossover Plugin began at 1. The battle to bring Plugin to its present version has brought Linux users huge advances by being able to directly view Microsoft documents and movies in popular Linux browsers. The developers at Codweavers have been busy. In v1.0, only five plugins were Now there are more than 15, downloadable and ready to install."
( Permalink: Crossing Over Submitted by Noel Mon May 26, 2003 )
|Passive Network Traffic Analysis|
|Security Focus tells us about
Passive Network Traffic Analysis.
"Through passive monitoring, a security admin can gain a thorough understanding of the network's topology: what services are available, what operating systems are in use, and what vulnerabilities may be exposed on the network. Much of this data can be gathered in an automated, non-intrusive manner through the use of standard tools, which will be discussed later in this article."
( Permalink: Passive Network Traffic Analysis Submitted by Noel Mon May 26, 2003 )
|FootPrinting: Before the Real Fun Begins|
|FootPrinting is an art of gathering target information. Its, just like knowing about your enemy before you try to attack. A successful attacker must harvest a wealth of information to execute a focussed and surgical attack. This enables an attacker to create a complete profile of an organization's security posture and this is achieved by using a combination of tools and techniques.
( Permalink: FootPrinting: Before the Real Fun Begins Submitted by Dr.T Mon May 26, 2003 )
|Moving Files In Linux|
|Linux Planet talks about how to
move files under Linux.
"Linux has more ways to move data around than most people would care to keep track of. This bounty of tools doesn't need to be confusing. The main thing is to know what options you have available, and then choose the few that you want to really get to know in depth. For the rest, just keep them in the back of your mind in case you come upon a scenario where learning a new tool might be the most efficient answer to solving your file moving problems."
( Permalink: Moving Files In Linux Submitted by Noel Fri May 23, 2003 )
|More on SCO|
|SCO has not found its code in the kernel.org Linux kernel or in the GNU/Linux OS. In an in-depth analysis MozillaQuest Magazine (mozillaquest.com) reports: SCO-Caldera spokespeople are contradicting each other and themselves about SCO claims there is SCO-owned code in Linux . . . SCO-Caldera's strategy is to stifle Linux development plus Linux distribution and Linux software sales, marketing, and deployment . . . SCO does not clearly state if the alleged tainted Linux code is kernel.org Linux kernel code, some other patched, hacked, or customized kernel code, GNU/Linux operating system code, Linux distribution code, or what. In the more than two months since SCO filed its Caldera v IBM lawsuit, it has yet to show any SCO-owned Unix code anywhere in the Linux kernel, the GNU/Linux OS, any Linux distributions, and so forth.
( Permalink: More on SCO Submitted by Anonymous Fri May 23, 2003 )
|Adventures with Kerberos, CVS, and GSS-API|
|O'Reilly talks about installing
Kerberos, CVS, and GSS-API.
"Once CVS was running gserver successfully as both client and server, I configured the Kerberos configuration file /etc/krb5.conf. I used the Heimdal installation documentation and info heimdal to work out what to put into the config file, and I attempted to set up the Kerberos principal cvs/NOSUCH.COM@NOSUCH.COM.*. A misconfigured Kerberos file produces the errors shown in examples 6 and 7."
( Permalink: Adventures with Kerberos, CVS, and GSS-API Submitted by Noel Fri May 23, 2003 )
|Running Windows Desktop Apps|
|Linux World takes a look at
"CrossOver Office has matured to the point where I consider it equal to Win4Lin in desirability. Not equal in capability or ease of use, mind you, but equal in value. Win4Lin is still my favorite solution, and it's an excellent choice for those who already have a copy of Windows 98 SE or one of the other supported Windows versions."
( Permalink: Running Windows Desktop Apps Submitted by Noel Fri May 23, 2003 )
|Embedded Linux "Cool Devices" Quick Reference|
|Linux Devices tells us about a lot of
cool Linux devices.
"Here, then, is a summary of some of the Embedded Linux based devices that have been disclosed publicly. Please bear in mind that the list below represents the tip of the embedded Linux iceberg, as it were. New devices based on Embedded Linux are being unveiled continually. We plan to update this Guide frequently, so be sure to check back periodically for the latest info."
( Permalink: Embedded Linux "Cool Devices" Quick Reference Submitted by Noel Fri May 23, 2003 )