|"Generic disaster recovery preparation for the UNIX platform includes maintaining the server's configuration details. For example, in the system information, you need to keep a hard copy of the method you are using for backup and restore. If you use ufsdump to back up the OS to locally attached tape drives, the information to keep includes all the backup file systems, the order of the file systems backed up, as well as information about the backup tape, OS level, patch level, disk partitions, file system layout, the third-party drivers, and so on." |
( Permalink: Flash Archives in Solaris Submitted by Noel Tue Jun 7, 2005 )
|Apple rumored to announce switch to Intel at WWDC|
|"A report at News.com lends credence to the rumor last month in the Wall Street Journal that Apple was in talks with Intel to replace IBM's PowerPC to power their personal computers. Such a move would have significant hurdles as far as both software vendors as well as the current user base, and some analysts suspected the talks were intended as a bargaining item with IBM, which has had problems with chip supply as well as developing a G5 suitable for a laptop. However the current News.com report suggests that an official announcement may come as soon as Monday at Apple's Worldwide Developer Conference (WWDC). " |
( Permalink: Apple rumored to announce switch to Intel at WWDC Submitted by Noel Mon Jun 6, 2005 )
|DenyHosts, an SSH Server Attack Denial Tool|
|Every once in a great while I run across a very useful tool whose simplicity amazes me. One of those tools recently hit my radar after I noticed several failed SSH login attempts to my machine. Apparently someone had plenty of time to try to login, and was not deterred by repeated login failure. That set me on a course to find a solution that was simple, effective and enough of a barrier to the attacker that they would move on out of frustration, or simply be denied enough that they would find easier targets. |
( Permalink: DenyHosts, an SSH Server Attack Denial Tool Submitted by Chuck Talk Mon Jun 6, 2005 )
|Beginner's Introduction to the KDE Desktop|
|This introductory article provides an overview of the KDE interface and tips on basic configuration to share with hesitant friends.
It's part of our "Windows to Linux" series and helps make those first few steps into the KDE desktop world as easy as possible. I've noticed that more and more new users of KDE are non-techies who need a quick introduction to this extensive and powerful desktop.
( Permalink: Beginner's Introduction to the KDE Desktop Submitted by Andrea W. Cordingly Mon Jun 6, 2005 )
|Knoppix 3.9 Review|
|Knoppix 3.9 has hit the streets a couple of days ago. It bundles all its usual goodies plus a few nice updates. On the positive side, OpenOffice has been updated to its latest beta version and KDE version 3.4.0 is included (yeah, I know that KDE 3.4.1 just came out with a few critical bugfixes at about the same time that Knoppix was released). The kernel is now 2.6.11 (the latest stable release). All the other packages has been updates from the latest Debian/sid distribution.
( Permalink: Knoppix 3.9 Review Submitted by Flavio Villanustre Mon Jun 6, 2005 )
|LinuxFest Northwest 2005: Wrap-Up Report|
|"LinuxFest Northwest is a non-commercial one-day conference and exhibition of open-source technology with an emphasis on Linux. It is held in the city of Bellingham, Washington, which is about 90 miles north of Seattle and about 20 miles south of the Canadian border. It is run by the Bellingham Linux Users Group (BLUG) with the help of other users groups. Admission is free and open to all." |
( Permalink: LinuxFest Northwest 2005: Wrap-Up Report Submitted by Noel Mon Jun 6, 2005 )
|Lucane groupware quick start guide|
|Lucane is an open source groupware solution that doesn’t require remarkable installation and configuration time. It is simple to use and has a modular architecture including all needed groupware modules like email-client, instant messaging, shared folders, calendar, white board, forums and more.
Read more at Linux-Tip.net
( Permalink: Lucane groupware quick start guide Submitted by fn-eagle Mon Jun 6, 2005 )
|A good morning with: Theo de Raadt|
|Everybody know that you're the OpenBSD and OpenSSH GURU and creator, one of most famous and used secure operating system nowaday. Why you created them? What did you need many years ago from os world when you created OpenBSD? What inspired you to write from scratch OpenBSD and OpenSSH?
I started working on OpenBSD, and many earlier projects, because I have always felt that vendor systems were not designed for quality. The primary goal of a vendor is to make money. In some industry markets, high quality can be tied to making more money, but I am sure by now all of us know the computer industry is not like that.
( Permalink: A good morning with: Theo de Raadt Submitted by Vincenzo Ciaglia Fri Jun 3, 2005 )
|Build a Perl/CGI voting system|
|Many Web-deployed applications are written within elaborate database-driven server-side development frameworks such as PHP and Java servlets, but for simple applications (for example, where the entire dataset fits comfortably within a Web server's RAM), data persistence can be easily accomplished using locked DBM files in conjunction with the Perl MLDBM module. This article presents a real-world example -- a Web-based voting application -- that highlights the use of minimal external modules, forgoes using client-based cookies, and takes advantage of CGI attributes.|
( Permalink: Build a Perl/CGI voting system Submitted by Anonymous Fri Jun 3, 2005 )
|Bluetooth Security Review|
|"Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables and connectors. It is supported and used in products by over 3000 companies, including large corporations such as Sony Ericsson, Nokia, Motorola, Intel, IBM, Toshiba, Motorola, Apple, Microsoft, and even Toyota, Lexus and BMW. A variety of products available on the market have short range Bluetooth radios installed, including printers, laptops, keyboards, cars and the most popular type of Bluetooth enabled devices - mobile phones, driving 60% of the Bluetooth market. " |
( Permalink: Bluetooth Security Review Submitted by Noel Fri Jun 3, 2005 )
|CPU Socket Basics|
|"Although there are currently only two main players in the CPU market, AMD and Intel, the number of choices is still enough to make the typical consumer's head spin. Each manufacturer has a few different models to promote, and many of these models can be found in a few different form factors (namely, the "sockets" to which they connect) that exclude interchangeability. This two-part series of Tech Tips will look at a few details of each of the currently-supported CPU (Central Processing Unit) sockets and how they are all similar and different from one to another. First up, we will take a look at the CPU sockets supporting modern Intel processors." |
( Permalink: CPU Socket Basics Submitted by Noel Fri Jun 3, 2005 )
|Remove insecure root grace period from sudo|
|"Unfortunately, sudo includes a grace period, wherein it will allow you to run privileged tasks repeatedly without a password. " |
( Permalink: Remove insecure root grace period from sudo Submitted by Noel Fri Jun 3, 2005 )
|Everything About Safari RSS, Part 1|
|"Over these next few installments, I'm going to show you (well, try to show you) what can and cannot be done with Safari RSS, what to expect from it, and how to take these capabilities as far as possible so that your foray into the world of RSS (or browser-based RSS, anyway) goes as smoothly as possible. Before starting, though, I ask that you take a few minutes to think about the number of things one can potentially do with HTML and RSS. The Safari engineers without doubt had to make choices, settle on a "vision" of how RSS would be used, and stay true to it while writing the application, so that it didn't turn into a soupy mess. This is what they have done, and I have found it is key to try to "get into the spirit," so to speak, before starting to work and evaluate Safari RSS. Only then can one appreciate the effort that went into it and decide whether it is the right application or not." |
( Permalink: Everything About Safari RSS, Part 1 Submitted by Noel Thu Jun 2, 2005 )
|Why Your Security Investigation Is Going To Fail|
|"What would normally take an ASE certified mechanic an hour to do turns into several days for Joe Schmo. That water pump IS going to come off, whether it likes it or not. After about 5 days, Joe gives up on the water pump and decides that the car isn't that important anyway. He pulls the car into the backyard, puts a TV and a few plants on the hood, and whistles while he walks back into the house.
Nothing to see here, just move along.
And so goes the great majority of internal security investigations in today's corporate world. "
( Permalink: Why Your Security Investigation Is Going To Fail Submitted by Noel Thu Jun 2, 2005 )
|Virtualization and emulation|
|Virtualization is a technique that provides the ability to partition hardware in a way that allows more than one operating system to run simultaneously. Each instance of the Operating System and its applications run on the native hardware (instructions are executed natively by the CPU). In contrast, emulators model a CPU and other subsystems in software so that the actual hardware only runs one instance of the Operating System and the emulator itself.
( Permalink: Virtualization and emulation Submitted by Flavio Villanustre Thu Jun 2, 2005 )