|Performance Inspector puts your finger on the pulse of your C/C++ and Java code, helping you nail down performance bottlenecks and problems with Linux kernel interaction. The suite of tools includes sample-based profiling, monitoring at the thread level, and more.
( Permalink: Performance Inspector Submitted by Anonymous Thu May 22, 2003 )
|Interview with Mark Komarinski|
|The author of the Training Course for Red Hat Linux and Senior Linux System Administrator for Harvard Medical School talks about his work and general Linux issues.
( Permalink: Interview with Mark Komarinski Submitted by LogError Thu May 22, 2003 )
|Linux Clustering With MOSIX|
|This tutorial explains what it is, how you go about cluster-enabling your Linux system, and how you can benefit from setting up a cluster. By the end of this tutorial, you will have set up your own MOSIX cluster. MOSIX is a special transparent form of clustering that is very easy to set up and can produce positive results with only a minimal investment of time and energy.|
( Permalink: Linux Clustering With MOSIX Submitted by Anonymous Wed May 21, 2003 )
|Linux Kernel Problems|
|In this weeks Security Alerts,
we look at problems in Linux 2.4
kernels, sendmail, IMAP clients, cdrecord, lv, GNU Privacy Guard,
EnGarde Secure Linux's sudo, SCO OpenLinux's mgetty and faxspool
directory, BEA WebLogic Server, Unreal Engine, and WebLogic Express.|
( Permalink: Linux Kernel Problems Submitted by Noel Wed May 21, 2003 )
|User Ditches Mac OS X; User Finds Yellow Dog Linux|
|This is the story of a Linux PC user (namely a Red Hat Linux user) who buys an iBook under the... influense of Apple's "switch" campaign, but soon enough finds Mac OS X's UI unresponsive and its performance lacking. Trying to find an alternative OS for his PPC laptop, he ends up on Yellow Dog Linux and he claims to be happy ever since.|
( Permalink: User Ditches Mac OS X; User Finds Yellow Dog Linux Submitted by Anonymous Wed May 21, 2003 )
|Administer Linux on the Fly|
|The /proc filesystem is one of Linux's great features, and this article gives you a thorough grounding in some of its most useful aspects. With it, you can administer many details of the operating system without ever having to shut down and reboot the machine, which is a boon for those who need to keep their systems as available as possible.
( Permalink: Administer Linux on the Fly Submitted by Anonymous Wed May 21, 2003 )
|Beginning Eclipse for Advanced Developers|
|This paper on beyondCode.org describes the author's experience transitioning from emacs to the Eclipse IDE, from the point of view of a seasoned Unix programmer. It is not meant as a step-by-step tutorial, rather it is a description of the promises and perils one may encounter when adopting Eclipse.|
( Permalink: Beginning Eclipse for Advanced Developers Submitted by Anonymous Wed May 21, 2003 )
|Perl.com takes a look at:
"This article is about a new Perl module called CGI::Kwiki. With this module you can create a Wiki Web site in less than a minute. Now that's quick. Or more appropriately, ``That's Kwik!''"
( Permalink: CGI::Kwiki Submitted by Noel Mon May 19, 2003 )
|Tool of the Month: Index and MultiTail|
|Unix Review takes a look at:
Index and MultiTail.
"This month I'm going to talk about two smaller tools that I like. One is the ultimate in minimalist personal databases, and the other is an extension of an idea that's been with Unix for a long time."
( Permalink: Tool of the Month: Index and MultiTail Submitted by Noel Mon May 19, 2003 )
|Introduction to IP CHAINS|
|The kernel starts with three lists of rules; these lists are called firewall chains or just chains. The three chains are called input, output and forward. When a packet comes in (say, through the Ethernet card) the kernel uses the input chain to decide its fate. If it survives that step, then the kernel decides where to send the packet next (this is called routing). If it is destined for another machine, it consults the forward chain. Finally, just before a packet is to go out, the kernel consults the output chain.
( Permalink: Introduction to IP CHAINS Submitted by Dr.T Mon May 19, 2003 )
|Gentoo Emerges Victorious|
|Linux World reviews:
"The 'meta-distro' Gentoo makes it possible to compile and configure everything on your system exactly the way you like, providing you with more structure and tools to ease the process and automate updates. Do I still like Debian? I absolutely love it. But until further notice, Gentoo is now my flavor of Linux. "
( Permalink: Gentoo Emerges Victorious Submitted by Noel Mon May 19, 2003 )
|What If SCO Is Right?|
|Internet Week asks:
what if SCO is right?
"Assume, as we have been, that there is proprietary Unix source code included in Linux. Assume that Linux vendors have been distributing this source code. Well, SCO is a Linux vendor too -- they announced on Wednesday that they are suspending distribution of Linux, but for years they did distribute Linux, under the same General Public License used for all Linux distributions. Since all the Linux vendors share source code, it's entirely possible that SCO was inadvertently distributing its own proprietary Unix code in its version of Linux. In that case, SCO would've already released its Unix source code into open source."
( Permalink: What If SCO Is Right? Submitted by Noel Mon May 19, 2003 )
|Java Theory and Practice: Urban Performance Legend|
|Urban legends are kind of like mind viruses; even though we know they are probably not true, we often can't resist the urge to retell them (and thus infect other gullible "hosts") because they make for such good storytelling. Most urban legends have some basis in fact, which only makes them harder to stamp out. Unfortunately, many pointers and tips about Java performance tuning are a lot like urban legends -- someone, somewhere, passes on a "tip" that has (or had) some basis in fact, but through its continued retelling, has lost what truth it once contained. This articleexamines some of these urban performance legends and sets the record straight.|
( Permalink: Java Theory and Practice: Urban Performance Legend Submitted by Frank Fri May 16, 2003 )
|Public Key and Symmetric Key Encryption|
|This is an excerpt from "A Practical Guide to Red Hat Linux 8" in which Mark G. Sobell gives you information on encryption. Read more at Help Net Security.|
( Permalink: Public Key and Symmetric Key Encryption Submitted by LogError Fri May 16, 2003 )
|Deploying Apache Tomcat on FreeBSD|
|When you think of platforms upon which you would deploy a Java Application Server, FreeBSD probably isn't the first one that comes to mind. However, Tony Arcieri hopes to show in this tutorial how easy it is to deploy Apache Tomcat on a FreeBSD system, complete with a native build of the JDK.|
( Permalink: Deploying Apache Tomcat on FreeBSD Submitted by Anonymous Fri May 16, 2003 )