|Use this only for good.|
"Kismet detects the presence of wireless networks, including those with hidden SSIDs. It can discover and report the IP range used for a particular wireless network, as well as its signal and noise levels. Kismet can also capture or sniff all network management data packets for an available wireless network. You can use Kismet to locate available wireless networks, troubleshoot wireless networks, optimize signal strength for access points and clients, and detect network intrusions.
" Introduction to Kismet
( Permalink: Introduction to Kismet Submitted by Noel Wed Apr 5, 2006 )
|Macintosh Home Monitoring|
|Article on how to automate some of the stuff in your house using a Mac.|
"Now don't let the words "home automation" frighten you. The approach here only scratches the surface of home automation, and uses sensors and software that are inexpensive and easy to use. In addition, we're sticking with wireless devices, so no pulling of cables or replacing existing wiring will be necessary. You won't quite be living like George Jetson, but your house will be a tad bit smarter." MacDevCenter.com -- Macintosh Home Monitoring
( Permalink: Macintosh Home Monitoring Submitted by Noel Wed Apr 5, 2006 )
|Speed your code with the GNU Profiler|
|Improving the performance of your applications is rarely a wasted effort, but it's not always clear which functions the program is spending most of its execution time on. Learn how to pinpoint performance bottlenecks using gprof for both user-space and system calls on Linux.|
( Permalink: Speed your code with the GNU Profiler Submitted by Anonymous Wed Apr 5, 2006 )
|backup your system using bash, tar and netcat|
|If things you read MUST have capital letters you may want to skip this one. Otherwise it's an interesting article. I might use SSH but netcat is probably more efficient.|
"so now that you've done this, you can wait and watch all the files on your host system scroll by on the screen... be prepared to wait a long while, especially for large drives. in the meantime, go talk with your SO (remember them?), install FreeBSD or, um, go outside for a walk...trust me, it's good for you." metashell: how to backup your linux system using bash, tar and netcat
( Permalink: backup your system using bash, tar and netcat Submitted by Noel Tue Apr 4, 2006 )
|The case of the 500-mile email|
|Interesting story. Not sure if I really believe all the details. But a good story.|
"The pieces fell into place, all at once, and I again choked on the dregs
of my now-cold latte. When the consultant had "patched the server," he
had apparently upgraded the version of SunOS, and in so doing
*downgraded* Sendmail. The upgrade helpfully left the sendmail.cf
alone, even though it was now the wrong version.
" The case of the 500-mile email
( Permalink: The case of the 500-mile email Submitted by Noel Tue Apr 4, 2006 )
|How To Get A Provider Independent IP Address|
|Great example of a solution to a problem a lot of people have.|
"First of all, I selected one IP (RE.AL.AD.DR) in my employer IP network and created ip-over-tcp tunnel from my home server to one of the employer's servers. It has been done using great UNIX tool vtun by Maxim Krasnyansky. Config files will be presented later in this article.At this step I got following interfaces on world server and home server sides:" Homo-Adminus Blog How To Get Provider Independent IP Address For Your Home Server?
( Permalink: How To Get A Provider Independent IP Address Submitted by Noel Tue Apr 4, 2006 )
|WSJ.com - Mac's Moment?|
|Well written article about a company named Aozora and their switch to Macs.|
"Within a few months, Aozora expects about 90% of its machines will be Macs.
What brought on the switch?
Bill Chute, Aozora's chief technology officer, says the company decided to go with Macs because of Apple's latest operating system, Mac OS X, which has made the machines more stable and functional for many business users. Before OS X, "it would have been impossible," he says, because Macs didn't have the reliability and the functions that Aozora needs." WSJ.com - Mac's Moment?
( Permalink: WSJ.com - Mac's Moment? Submitted by Noel Tue Apr 4, 2006 )
|First look at Service Data Objects for C++|
|Service Data Objects provide a means of describing the structure of a graph of data elements and a means of loading a particular instance of the data based on that graph description from any data source. SDO also provides the ability to track changes to the graph of data as it is used by an application. In this article, you are introduced to the API you need to work with Service Data Objects from C++.|
( Permalink: First look at Service Data Objects for C++ Submitted by Anonymous Tue Apr 4, 2006 )
|The Perfect Xen 3.0 Setup For Debian|
|This tutorial provides step-by-step instructions on how to install Xen (version 3.0.1) on a Debian Sarge (3.1) system.|
Xen lets you create guest operating systems, so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware.
This HowTo uses Debain Sarge for both the host OS (dom0) and the guest OS (domU). In an additional section at the end it will also show how to create a virtual local network with virtual machines, with dom0 being the router.
( Permalink: The Perfect Xen 3.0 Setup For Debian Submitted by Falko Timme Mon Apr 3, 2006 )
|Overview of the ten major Linux distributions|
|LinxForums gives short overviews of the ten major distributions, and concludes: "People often ask 'so which distribution is right for me?' The answer is very simple: 'It depends!' It depends on your needs, it depends on your experience, on your philosophy or your tastes. It depends on a lot of things, and even if you found the one you preferred among these 10 majors distributions, don't forget that there are about 340 other distributions available, which could potentially suit your needs. If you're ready for the adventure, go and explore."|
( Permalink: Overview of the ten major Linux distributions Submitted by Mark Mon Apr 3, 2006 )
|Can you tell the real news from the fake?|
|The second annual "Spot the Spoofs" challenge. Sift through the technology news we've provided and see if you can separate the wheat from the chaff (yes, some of the stories are true!). Click on the link to check your answer.|
( Permalink: Can you tell the real news from the fake? Submitted by Anonymous Mon Apr 3, 2006 )
|Setting the maximum volume limit on iPod|
|This could also be useful if you want to prevent accidentally blowing out your ears.|
"The new 1.1.1 software update for iPod nano and Fifth Generation iPod provides an easy way for you to set a maximum volume limit to prevent the volume from exceeding a certain level. You can also assign a combination to prevent the setting from being changed which is ideal for parental control." Setting the maximum volume limit on iPod
( Permalink: Setting the maximum volume limit on iPod Submitted by Noel Mon Apr 3, 2006 )
|10 steps to a better IT support process|
|Supporting users in a corporate environment can be a major pain in the behind. This article explains a methodology to help IT support workers in their day to day job.|
"As an IT professional, you need to have a structured mind to be able to think through all the different problematic situations that can present themselves to you on a day to day basis. After having worked in IT for a while, you should eventually start to develop a certain methodology that will help you solve most problems quickly and effectively."
10 steps to a better IT support process
( Permalink: 10 steps to a better IT support process Submitted by Kiltak Mon Apr 3, 2006 )
|The Inner Working of a Bayesian Spam Filter|
|Great article that looks at what a Bayesian Spam Filter actually is.|
"The Bayesian Theory, when applied to spam mail, is a very effective method of detecting which emails are legitimate or not. Bayesian filters calculate the probability of a message being spam according to its content. The more emails it sees, the more effective it gets. At first, the filter will not be perfect, but if you provide it with hundreds of emails to analyze, it should eventually achieve approximately 99.5% of efficiency." [Geeks are Sexy] technology news: The Inner Working of a Bayesian Spam Filter
( Permalink: The Inner Working of a Bayesian Spam Filter Submitted by Noel Fri Mar 31, 2006 )
|How to Drive your Website Developer Insane|
|This is very funny.|
"Constantly bring up your expert programmer son/cousin/close family friend. Make one up if you don't really have one! Be sure to give them the most annoying qualities possible and make sure they always give the opposite advice of the programmer actually working on the project. This programmer wants to do the site in PHP? Well, your obscure relative says ASP is really better." alwaysstock » Blog Archive » How to Drive your Website Developer Insane: A Primer
( Permalink: How to Drive your Website Developer Insane Submitted by Noel Fri Mar 31, 2006 )