|On Lamp tells us more about
"In order for your client browsers to trust your new Certificate Authority, they must be configured to accept your CA's public key. There are two possible formats that browsers will accept for new certificate authority certs: pem and der. You can generate a der from your existing pem with a single OpenSSL command:"
( Permalink: Distributing Your CA to Client Browsers Submitted by Noel Thu Feb 27, 2003 )
|Program Hides Secret Messages in Executables|
|Security Focus tells us about a
program that hides secret messages in executables
"El-Khalil's research focused on redundancies in the Intel x86 instruction set -- places where at least two different instructions are effectively the same. Each choice between two redundant options can represent a single bit of data."
( Permalink: Program Hides Secret Messages in Executables Submitted by Noel Thu Feb 27, 2003 )
|Comparison of Windows vs. Unix|
|Linux World looks at
Unix and Windows.
"This article compares the Microsoft client/server architecture to the Unix approach in terms of systems decisions facing a university faculty. To put this in context, imagine that you are being interviewed for a job as the faculty's systems manager. The chairman of the selection committee asks you to come in to discuss whether the faculty would be better served if it went all-Linux instead of staying all-Microsoft."
( Permalink: Comparison of Windows vs. Unix Submitted by Noel Thu Feb 27, 2003 )
|Keeping /etc Under CVS|
|Did you ever take time to look at why developers use versioning and change control systems? Think about that for one minute and then think of how system administrators would benefit from it.
Find out here, The article.|
( Permalink: Keeping /etc Under CVS Submitted by Anonymous Thu Feb 27, 2003 )
|Sun blade servers to use AMD chips|
|News.com reports that
Sun blade servers will use AMD chips.
"Sun's first blade servers will have a single processor, though the company plans to follow rivals Dell Computer, Hewlett-Packard and IBM in launching dual-processor models, Sun has said. Those rivals--which also plan to release more powerful blade servers--use Intel but not AMD processors in their blade servers."
( Permalink: Sun blade servers to use AMD chips Submitted by Noel Wed Feb 26, 2003 )
|Building a Vector Space Search Engine in Perl|
|Perl.com tells us how to build
a Vector Space Search Engine in Perl.
"In this article, I want to show you how to build and run a search
engine using a vector-space model, an alternative to reverse index
lookup that does not require a database, or indeed any file storage at
all. Vector-space search engines eliminate many of the disadvantages
of keyword search without introducing too many disadvantages of their
own. Best of all, you can get one up and running in just a few dozen
lines of Perl."
( Permalink: Building a Vector Space Search Engine in Perl Submitted by Noel Wed Feb 26, 2003 )
|Interview with Cyrus Peikari|
|The CEO of AirScanner Mobile Security and co-author of "Maximum Wireless Security" talks about wireless security. Read more at Help Net Security.
"What are your favorite tools for dealing with security when it comes to wireless networks and why?
For UNIX, right now Kismet is King. Each release of Kismet continues to be more and more impressive."
( Permalink: Interview with Cyrus Peikari Submitted by LogError Wed Feb 26, 2003 )
|Unix Review takes a look at
"PowerDNS is an authoritative-only nameserver. This means that it will
answer queries about zones that it is responsible for, but it won't attempt
to find information on another zone/domain. For example, if you set up
PowerDNS to handle "yourdomain.com," it won't answer queries for "mydomain.com"
or "bobsdomain.com". This means that you don't have to worry about a poorly
configured (or maliciously configured) server polluting your nameserver's
( Permalink: Alternative Nameservers Submitted by Noel Wed Feb 26, 2003 )
|Red Hat's Mark de Visser|
|Red Hat executive Mark de Visser talks about Linux's enterprise success in vertical markets like the financial industry, where in the data center enterprises are deploying Linux and Microsoft's licensing strategy in part two of this question-and-answer interview.
( Permalink: Red Hat's Mark de Visser Submitted by Jan Stafford Tue Feb 25, 2003 )
|Sysadmin Tales of Terror|
|Crossnodes brings us:
Sysadmin Tales of Terror.
"The biggest challenge a system administrator ever faces is inheriting a networking mess: taking on a new job, or a new client, with a computing infrastructure that has grown without rhyme or reason. Lost passwords, little or no documentation, no-name network components, and cables snarled into alternate dimensions are just a sample of the evils to face and conquer."
( Permalink: Sysadmin Tales of Terror Submitted by Noel Tue Feb 25, 2003 )
|Book Review: Mission-Critical Security Planner|
|If you want to do security planning and you don't know where to start, this book is mandatory reading material. It will make your life easier and your system more secure. Read more at Help Net Security.|
( Permalink: Book Review: Mission-Critical Security Planner Submitted by LogError Tue Feb 25, 2003 )
|OpenSSL Timing Attack|
|In this weeks
Security Alerts, we look at problems in OpenSSL, Oracle, mod_php, MySQL, pam_xauth, VNC, apcupsd, nethack, Rogue, and BitchX. |
( Permalink: OpenSSL Timing Attack Submitted by Noel Tue Feb 25, 2003 )
|Opera and Microsoft|
|Linux World tells us about
Opera showing a graceful, humorous response to Microsoft blunder.
"Opera responded to this latest burst of incredible pettiness by Microsoft with a little humor, a lot of PR and a blow to the solar plexus. The humor came in the form of a "Bork edition" of the Windows version of Opera. When you visit MSN running the "Bork edition," it renders the page in the language of "the famous Swedish Chef from the Muppet Show: Bork, Bork, Bork!"
( Permalink: Opera and Microsoft Submitted by Noel Tue Feb 25, 2003 )
|Qmail On Debian|
|Vince has written a paper entitled Qmail on Debian". |
This is a fairly detailed paper, that walks you through installation, various configurations such as Servers, Null Clients, POP, etc...
( Permalink: Qmail On Debian Submitted by Vince Mon Feb 24, 2003 )
|A Quick Guide to vi|
|O'Reilly brings us:
A Quick Guide to vi.
"But what if you need to edit a file quickly in Terminal and don't have the time to learn and practice vi? In this article, I will present a quick guide to getting you started using vi. Do remember though, topics on vi are enough to fill an entire book, and hence this article is just a tip of the iceberg. Hopefully, it will shed some light on this powerful editor and tempt you to learn more."
( Permalink: A Quick Guide to vi Submitted by Noel Mon Feb 24, 2003 )