|System administrators must know how processes are created and destroyed within the UNIX environment in order to understand how the system fits together and how to manage misbehaving processes. Examine the life cycle of a process so that you can relate what you see happening on your system to what's going on within the kernel.|
( Permalink: Delve into UNIX process creation Submitted by BlueVoodoo Mon Jan 8, 2007 )
|Blogging From Ubuntu Using Drivel|
|Drivel is a GNOME client for working with online journals, also known as weblogs or simply blogs. It retains a simple and elegant design while providing many powerful features.
Read Full article here|
( Permalink: Blogging From Ubuntu Using Drivel Submitted by dave Mon Jan 8, 2007 )
|The Perfect Setup - OpenVZ with CentOS 4.4|
|This article describes how to prepare a CentOS 4.4 server for OpenVZ virtual machines. With OpenVZ you can create multiple Virtual Private Servers (VPS) on the same hardware, similar to Xen and the Linux Vserver project. OpenVZ is the open-source branch of Virtuozzo, a commercial virtualization solution used by many providers that offer virtual servers.|
( Permalink: The Perfect Setup - OpenVZ with CentOS 4.4 Submitted by Falko Timme Fri Jan 5, 2007 )
|Kerberos authentication for AIX Version 5.3|
|Find out how to use application programming interfaces (APIs) when writing your own custom Kerberos-based authentication applications. In this article, you'll examine different Kerberos credential cache name formats that AIX NFS V4 supports and are required for authentication purposes. You'll also look at different methods of obtaining the Kerberos credential.
( Permalink: Kerberos authentication for AIX Version 5.3 Submitted by BlueVoodoo Fri Jan 5, 2007 )
|New Year 2007 - The year of GNU/Linux|
|We usher in a new year by making new year resolutions and wishes and believe that this year will be even better than the preceeding year. So what is a Linux enthusiast to wish for if not for the year 2007 to indeed be the year of GNU/Linux ? And as this article indicates, this year could very well be the year of GNU/Linux.|
( Permalink: New Year 2007 - The year of GNU/Linux Submitted by sas Fri Jan 5, 2007 )
|Intrusion detection with AIDE|
AIDE is an Intrusion Detection System (IDS). Which means that AIDE is not a tool to prevent an intrusion but is actually here to report that an intrusion might have happened.
This tutorial will show how-to install and configure AIDE so you get daily reports emailed directly to you, in which you will be informed of which files might have been modified, added or deleted.
Detect intrusion with AIDE
( Permalink: Intrusion detection with AIDE Submitted by chantra Thu Jan 4, 2007 )
|Create custom keyboard shortcuts in Linux|
|Short but informative.|
"Most (if not all) users are aware of the ability to create keyboard shortcuts using the Keyboard Shortcuts menu in Preferences. However, most users are unaware that you can add any custom command to a keyboard shortcut in GNOME using gconf-editor. I will walk you through this process." Create custom keyboard shortcuts in Linux at <> CodeJacked >
( Permalink: Create custom keyboard shortcuts in Linux Submitted by Noel Thu Jan 4, 2007 )
|Another lost year for Linux? I think not|
|Nice list of some of the big events in 2006.|
"BM cancelled their contract with Microsoft last October which means that they will no longer use Windows for their desktops. Beginning July, IBM employees will begin using a Red Hat-based platform. " Seopher.com - Another lost year for Linux? I think not
( Permalink: Another lost year for Linux? I think not Submitted by Noel Thu Jan 4, 2007 )
|Running Internet Explorer in Ubuntu Linux|
|No clicks needed. No boring setup processes. No Wine complications. Just one easy script and you’ll get three IE versions to test your Sites. And it’s free and open source.This may be very helpful for software developers and web developers to test their applications.
Read Full Story|
( Permalink: Running Internet Explorer in Ubuntu Linux Submitted by dave Thu Jan 4, 2007 )
|How to protect buggy programs|
|A Buffer overflows is a serious security problem. It allows an attacker to inject executable code of their choice into an already-running application. This ability to run arbitrary code at certain memory addresses is dangerous as attacker being able to execute the instructions from anywhere in memory.
This howto explains use of DieHard software to protect popular application such as Mozilla firefox. It protects applications from as-yet unfixed bugs and security vulnerabilities that exploit them. Think of DieHard as a new line of defense against hackers, together with anti-virus protection and firewalls.
( Permalink: How to protect buggy programs Submitted by nixCraft Wed Jan 3, 2007 )
|The Abdera project for high-performance Atom feeds|
|This article demonstrate how you can start to implement Atom-enabled applications using a new open-source project, called Abdera, currently under incubation at the Apache Software Foundation. Its a good article showing you some tricks with its Feed Object Model, XPath and XSLT support, extension handling and incremental parsing model.|
( Permalink: The Abdera project for high-performance Atom feeds Submitted by Anonymous Wed Jan 3, 2007 )
|Tunneling MySQL connections through SSH|
|This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world.|
( Permalink: Tunneling MySQL connections through SSH Submitted by Falko Timme Wed Jan 3, 2007 )
|How to install 3D-Desktop using Beryl on Mandriva|
|Windows Vista provides two entirely new features to manage windows using Windows Flip and Windows Flip 3D. Linux is already using this technology. 3D-Desktop is an OpenGL program for switching virtual desktops in a seamless 3-dimensional manner on Linux. The current desktop is mapped into a full screen 3D environment where you may choose other screens. Several different visualization modes are available. Mandriva 2007 has a the 3D desktop functionality implemented. You can set it up using the Mandriva Control Centre. Unfortunately it is not always working in the first place. Depending on the installed hardware, it works out of the box but also after downloading and installing new drivers and hacking the configuration files. This workshop describes the 3D Desktop installation on Mandriva 2007 using Beryl and Nvidia graphics cards.
Read more at Linux-Tip.eu
( Permalink: How to install 3D-Desktop using Beryl on Mandriva Submitted by Fran Neugebauer Wed Jan 3, 2007 )
|A guide for switching to a Mac|
|Nice article for anyone who has their first Mac.|
"What follows is a round-up of everything that stuck out to me when I made the move to my first Mac. I'm still a dual-OS fellow, but after I've figured out the ins and outs of my Mac, it's by far the place I find easiest to get things done. If you're delving into Macs for the first time, the following should come in handy." Hack Attack: A guide for switching to a Mac - Lifehacker
( Permalink: A guide for switching to a Mac Submitted by Noel Wed Jan 3, 2007 )
|Groklaw - Three Ubuntu Books|
|Three reviews of Ubuntu books. I have been using Ubuntu on a desktop machine at work and its been great.|
"Groklaw member luvr sends us his review of three Ubuntu books, Moving to Ubuntu Linux, by Marcel Gagn [article by Gagn, Moving to Ubuntu Linux], The Official Ubuntu Book, by Benjamin Mako Hill, Jono Bacon, Corey Burger, Jonathan Jesse, Ivan KrstiÄ‡ [sample chapter 4], Ubuntu Unleashed, by Andrew Hudson and Paul Hudson [sample chapter on installation]. Enjoy. Maybe today is a good day to give Ubuntu or Kubuntu a whirl, if you haven't already?" Groklaw - Three Ubuntu Books, reviewed by Groklaw's luvr
( Permalink: Groklaw - Three Ubuntu Books Submitted by Noel Mon Jan 1, 2007 )