|Continuing on the success of last year, New York City BSD Conference
(NYCBSDCon) is the main technical conference on the East Coast for the
BSD community to get together to share and gain knowledge, to network
with like-minded people, and to have fun. This event is organized by
members of the New York City *BSD Users Group (NYC*BUG).
The NYCBSDCon program committee is accepting submissions for
imaginative, embryonic and energizing presentations surrounding the BSD
operating systems. We are looking to attract a wide range of speakers
and attendees; therefore, topics of interest range from the esoteric to
development to practical, everyday sysadmin life.
( Permalink: NYCBSDCon 2006 Call For Presentations Submitted by Brad Schonhorst Mon Jul 24, 2006 )
|Ubuntu open to aiding derivative distributions|
|Matt Zimmerman has responded to a recent NewsForge article that suggests that the maintainers of derivative distributions are unintentionally violating the requirements of the GNU General Public License (GPL). Ubuntu's technical leader says the project may be able to help.
Read more at NewsForge
( Permalink: Ubuntu open to aiding derivative distributions Submitted by lh8 Mon Jul 24, 2006 )
|Monitor your network with Nload|
|nload is a ncurse based network traffic analyser. Being a ncurse based tools, you do not need to start X in order to use that software which is necessary when administering machines remotely … and even locally actually.
nload allow a system administrator to easily monitor the traffic going on its network. It provide both a graph of incoming and outgoing traffic as well as network data transfert statistics.
More about Nload|
( Permalink: Monitor your network with Nload Submitted by chantra Fri Jul 21, 2006 )
|ns-2 network simulator: Free, yes; friendly, no|
|The open source network simulation tool ns-2 is an invaluable tool for researchers working on wired or wireless networks. I came across ns-2 while working on my thesis. I needed a network simulator, and since my college lacked the brand-name heavyweights, I had to look for an alternative that was free but could do the job. While ns-2 is free, it's also pretty unfriendly.
Read more at NewsForge.
( Permalink: ns-2 network simulator: Free, yes; friendly, no Submitted by Lisa Fri Jul 21, 2006 )
|How to use Subversion with Eclipse|
|From the beginning, Eclipse included tight integration with the Concurrent Versions System (CVS) in order to provide access to change-management capabilities. Now, many projects -- notably those run by the Apache Software Foundation -- are using a different change-management system: Subversion. This article demonstrates how to add Subversion support to Eclipse and how to perform basic version-control activities from the IDE.|
( Permalink: How to use Subversion with Eclipse Submitted by Anonymous Fri Jul 21, 2006 )
|Five common PHP design patterns|
|Design patterns are just for Java architects -- at least that's what you may have been led to believe. In fact, design patterns are useful for everyone. If these tools aren't exclusive to architecture astronauts, what are they, and why are they useful in PHP applications? This article explains.|
( Permalink: Five common PHP design patterns Submitted by Anonymous Fri Jul 21, 2006 )
|Linux Patch Management|
|Michael Jang has written a new book in Bruce Perens' Open Source Series tackling the often sticky subject of Linux patch management. PCBurn has a review and a practical examination of how well the book works for setting up a repository.|
( Permalink: Linux Patch Management Submitted by Inhibit Thu Jul 20, 2006 )
|Enlightenment 17 QuickStart Guide|
|Enlightenment 17 or E17 as it is generally called, is a cool Window Manager for X. The latest stable version of Enlightenment is E16 (0.16.8.1). In this article we will talk about the latest CVS build available (0.16.999.023).|
( Permalink: Enlightenment 17 QuickStart Guide Submitted by Falko Timme Thu Jul 20, 2006 )
|Create a secure Linux-based wireless access point|
|Great article about making a secure access point using Linux.|
"Wi-Fi Protected Access version 2 (WPA2) is becoming the de facto standard for securing wireless networks, and a mandatory feature for all new Wi-Fi products certified by the Wi-Fi Alliance. We all know the security weaknesses of its predecessor, WEP; this time they got it right. Here's how to implement the WPA2 protocol on a Linux host and create a secure wireless access point (WAP) for your network." Linux.com | Create a secure Linux-based wireless access point
( Permalink: Create a secure Linux-based wireless access point Submitted by Noel Thu Jul 20, 2006 )
|Coding without side effects|
|Object-oriented programming with imperative languages like C, C++ and Java has been the norm over the years. But some visionaries argue that other paradigms are more productive. In imperative languages, any method that can possibly return different values, given the same input, has side effects. This article explores the basics of functional programming using Haskell. You to can come to appreciate the raw productivity and power that a functional language can provide and how it eliminates programming side effects.|
( Permalink: Coding without side effects Submitted by Anonymous Thu Jul 20, 2006 )
|How to Make Firefox for Mac More Mac-like|
|How to change the look of Firefox and some other stuff.|
"If you've done all of the previous visual improvements, you should now have a browser which blends in with the Mac interface. If for some reason you still aren't satisfied with Firefox for Mac, you'll want to download an optimized build. While this will do nothing to improve the look, it will certainly speed up the browser, giving Firefox that extra edge." How to Make Firefox for Mac More Mac-like Â· cavemonkey50.com
( Permalink: How to Make Firefox for Mac More Mac-like Submitted by Noel Thu Jul 20, 2006 )
|How to restore a hacked Linux server|
|Great article on what steps you might want to take when recovering a cracked machine.|
"Every sysadmin will try its best to secure the system/s he is managing. Hopefully you never had to restore your own system from a compromise and you will not have to do this in the future. Working on several projects to restore a compromised Linux system for various clients, I have developed a set of rules that others might find useful in similar situations. The type of hacks encountered can be very variate and you might see very different ones than the one I will present, or I have seen live, but even so, this rules might be used as a starting point to develop your own recovery plan.
" How to restore a hacked Linux server | MDLog:/sysadmin
( Permalink: How to restore a hacked Linux server Submitted by Noel Wed Jul 19, 2006 )
|Debunking the Myth of High-level Languages|
|Nice overview of the differences between high level and low level programming languages.|
"The definition of a high-level language is a moving target. Languages that were considered high-level when I learned to program are now considered low-level. In general, a programming language provides a midway point between how you think about a program and how a computer executes the program. Languages that are closer to you than to the computer are considered high-level, while others are considered low-level." Debunking the Myth of High-level Languages > What Is a High-Level Language?
( Permalink: Debunking the Myth of High-level Languages Submitted by Noel Wed Jul 19, 2006 )
|Tremulous: The best free software game ever?|
|Cool sounding game.|
"Linux and open source software lag behind the proprietary market in the number and quality of available video games, especially in the realm of first-person shooters (FPS), a genre dominated by the likes of Doom, Quake, Unreal, Half-Life, and Halo. Here, Linux is an afterthought, if not ignored completely. Tremulous, a mixture of FPS and RTS (real-time strategy) written by Tim Angus, is an exception to that rule." NewsForge | Tremulous: The best free software game ever?
( Permalink: Tremulous: The best free software game ever? Submitted by Noel Wed Jul 19, 2006 )
|Develop for the Web with TurboGears and Python|
|In this second article of a two-part series, we demonstrate TurboGears, another open source MVC-style Web application framework based on Python. This article shows how to use TurboGears to create a Web-based shopping application and concludes with a comparison between Turbogears and Django. |
( Permalink: Develop for the Web with TurboGears and Python Submitted by IdaAshley Wed Jul 19, 2006 )