|On Lamp takes a look at
"Most of these interfaces perform a make-over of NetHack with flat, 2D graphics, but some also present a pseudo-3d look. Falcon's Eye aims for a much more sophisticated transformation, visually and otherwise. It overlays the ASCII characters with detailed graphics presented in an isometric 3D perspective -- accompanied with animation, sound effects, and music -- for the dungeons, player characters, creatures, and items."
( Permalink: Falcon's Eye: The Making-Over of Nethack Submitted by Noel Fri Jan 3, 2003 )
|Configuring Jaguar's Firewall|
|O'Reilly tells us how to set up
"Many of you already know that Jaguar, Mac OS X 10.2, comes with a built-in firewall. In an effort to keep things simple, Apple provides the basic ability to configure this firewall via the GUI interface in System Preferences, but otherwise is silent on its extensive benefits and usefulness. "
( Permalink: Configuring Jaguar's Firewall Submitted by Noel Thu Jan 2, 2003 )
|Getting Started With IRC|
|Linux World takes a look at
"IRC networks are hosted on single or multiple servers, all linked together. When you sign on to an IRC network, you sign on through a single server, but once connected you can chat with all users signed on to any server. IRC networks, thank goodness, are separate entities."
( Permalink: Getting Started With IRC Submitted by Noel Thu Jan 2, 2003 )
|The Duct Tape of the Internet|
|Unix Review updates man pages with
"When you're a Perl programmer, you never fret about those little ugly tasks that creep up. Perl can deal with file wrangling, text manipulation, and process management in a way unequaled by any other single language, whether open source or proprietary."
( Permalink: The Duct Tape of the Internet Submitted by Noel Thu Jan 2, 2003 )
|Red Hat Linux 8 Bible|
|Slashdot reviews the book
Red Hat Linux 8 Bible.
"So what did I think overall? Well, as I said, it's too big. But on the other hand it's too small. It's too big in that it covers such a wide range of topics that very few people are likely to be interested in all of it. It's too small in that it just doesn't have the space to go into great depth about most of the topics is covers."
( Permalink: Red Hat Linux 8 Bible Submitted by Noel Thu Jan 2, 2003 )
|Life In the Trenches: A Sysadmin Speaks|
|The Age talks to a
"In 1982, he went into a support/sysadmin role and has stayed in that line ever since. Says he: "I guess this job was inevitable for me since I discovered computers at the age of 11. The only job I've ever had that wasn't in the computer industry was a brief stint selling hotdogs outside a pub while I was at university, which lasted until I found a part-time programming job."
( Permalink: Life In the Trenches: A Sysadmin Speaks Submitted by Noel Thu Jan 2, 2003 )
|Using Your iPod Under Linux|
|Linux Lookup tells us how to
use our iPod under Linux.
"Things were looking quite bleak until I came across gnuPod (english website). gnuPod is a series of GPL'd perl scripts that allow you to upload and delete songs from your iPod, and create playlists using XML. gnuPod should work on both Windows and Mac iPods, as long as your operating system supports the filesystem."
( Permalink: Using Your iPod Under Linux Submitted by Noel Tue Dec 31, 2002 )
|Setting Up A SuSE 8.0 Linux DHCP Client|
|Linux Planet takes a look at setting up a
SuSE 8.0 Linux DHCP client.
"DHCP allows an administrator to dynamically assign a network address to clients that connect to that network. It's useful, for example, with laptops that are used in several networks. DHCP is also a vital tool on large networks where keeping track of all addresses and configuring clients would otherwise be a major headache."
( Permalink: Setting Up A SuSE 8.0 Linux DHCP Client Submitted by Noel Tue Dec 31, 2002 )
|Buffer Overflows in SSH and PHP|
|In this weeks Security Alerts, we look at buffer overflows in SSH, PHP, typespeed, Cyrus IMAP Server, Cyrus SASL library, and pdftops; and problems with PFinger, KDE, and zkfingerd. |
( Permalink: Buffer Overflows in SSH and PHP Submitted by Noel Tue Dec 31, 2002 )
|Red Hat 8: A Glimpse of the Desktop Future|
|Does Red Hat 8.0 give us hints about the future of Linux on the desktop?
"Competition and choice among GUI's is wonderful, but a single distribution should have a single desktop that is as integrated and consistent as possible. The duplicated efforts do have a place and are not a waste, but they should not divide the limited resources of a for-profit firm that should be making the best interface that it can. I hope Red Hat continues with this shift and follows it to its logical conclusion."
( Permalink: Red Hat 8: A Glimpse of the Desktop Future Submitted by Anonymous Tue Dec 31, 2002 )
|Return of the Independent Game Developer?|
|On Lamp talks about the
independent game developer.
"Tunnel's thesis is that the current climate favors a resurgence of independent development. Whereas Richard Garriot had to write Akalabeth in Assembly in 1979 -- photocopying manuals, and selling diskettes via mail order -- things are a little easier now. Distribution is the easiest problem to solve. Increasingly ubiquitous Internet access alleviates this need somewhat, and burn-on-demand CD resellers can fill in most of the rest of the gap."
( Permalink: Return of the Independent Game Developer? Submitted by Noel Mon Dec 30, 2002 )
|Automatically Extending Your Data|
|Unix Review brings us:
Automatically Extending Your Data.
"Perl is great at parsing data and bringing it into memory-based data structures for reformatting or analysis. One of Perl's features that permits relatively easy creation of complex data structures is auto-vivification a mouthful to say, but it roughly means data structures get expanded as necessary."
( Permalink: Automatically Extending Your Data Submitted by Noel Mon Dec 30, 2002 )
|Cryptosystems: Configuring IPSec|
|On Lamp tells us how to
"In the next two articles, I'll demonstrate how to configure and troubleshoot an IPSec VPN on a FreeBSD system. When I first started configuring VPNs, I quickly discovered two things. First, there is more than one way to configure a VPN correctly . Along with my demonstration configuration files, I'll be including URLs to other IPSec tutorials, and you'll see for yourself that the syntax will vary slightly from tutorial to tutorial."
( Permalink: Cryptosystems: Configuring IPSec Submitted by Noel Mon Dec 30, 2002 )
|RunTime: Context Switching, Part 2|
|This article looks at two behaviors of the scheduler. The first behavior is the reaction to adding more choices to the scheduler's switching decision. The second demonstrates fairness by performing a uniform workload in multiple threads. Source code is provided so you can experiment on your own. Last month's column looked at bare context switch times by using the best primitives on both Windows and Linux. According to those results, context switch time under Windows takes only half as long as under Linux.|
( Permalink: RunTime: Context Switching, Part 2 Submitted by Anonymous Mon Dec 30, 2002 )
|Parsing With the Spark Module|
|Spark is a powerful and general parser/compiler framework written in Python. In some respects, Spark offers more than SimpleParse or other Python parsers. Being pure Python, however, it is also slower. This article discusses the Spark module, with code samples, an explanation of its usage, and suggestions for its areas of application. This article also follows an earlier article of the "Charming Python" series which introduces some basic concepts in parsing and discusses the Spark module. Parsing frameworks are a rich topic that warrants quite a bit of study to get the full picture; these two articles are a good place to start.|
( Permalink: Parsing With the Spark Module Submitted by Anonymous Fri Dec 27, 2002 )