Showing headlines posted by tuxchick

« Previous ( 1 ... 76 77 78 79 80 81 82 83 ... 84 ) Next »

The Right to be a Charitable Community (II)

As a Linux community member, I have the right to do charitable work centered around giving my time away for the cause of Free Software...The GPL guarantees that our gifts will have the longevity they deserve.

Replacing ms dns with bind9

Replacing ms dns with bind9 is an better idea here is why:
1.It's really faster (noticed when i run first query on that machine and had lower latency)
2.Better security (windows2k is not supported with patches in future)
3.You can migrate easily to linux after that ;)

[Ed.- This is a good quickstart. Please do the Internet a favor and study the BIND documentation thoroughly.]

Hacks From Pax: SELinux Administration

  • LinuxSecurity.com - Feature Stories; By Pax Dickinson (Posted by tuxchick on Nov 7, 2005 11:16 PM EDT)
  • Story Type: Tutorial
Hi, and welcome to the third in a series of articles on Security Enhanced Linux. My first SELinux article detailed the background of SELinux, while my second article in the series discussed how SELinux makes access decisions. This week, I'll talk about how an SELinux system differs from a standard Linux system in terms of administration. Most of what you already know about Linux system administration will still apply to an SELinux system, but there are some additions and changes that are critical to understand when using SELinux.

Ten Things I Hate About (U)nix

UNIX was a terrific workhorse for its time, but eventually the old nag needs to be put out to pasture. David Chisnall argues that it's time to retire UNIX in favor of modern systems with a lot more horsepower.

"User Friendly" and "GPF" creators on comics and operating systems

Web comics are the next incarnation of traditional cartoons. And while the medium in which they are published has changed, the idea of comics making commentary still stays the same. Today, some Web comic creators use their comic to promote Linux advocacy.

Two of the better known Web comics, User Friendly and General Protection Fault, have used Linux and open source as inspiration for many of their story lines.

[Ed.- Don't miss this hilarious interview. Just like The Daily Show, you find more truth in the comics than in the news.]

(Mandriva) Background: Linux software repositories and software installation

This section is aimed at all those who have no or limited Linux experience, and are unfamiliar with software repositories. It occurred to me that novice Linux users are often at a loss where to get software, and the next thing that happens is that they manage to find some rpm file somewhere on the internet, and run into what is aptly called 'dependency hell' (for Linux insiders: note the pun! Ah well, I'm not good with those anyway..). So I decided to put up a couple of paragraphs about software installation, and clear up a few puzzling points.

[Ed.- great article- only please, for the love of $deity and readability, lose the text-scrolling-over-fixed background. Ow.]

More on Sony: Dangerous Decloaking Patch, EULAs and Phoning Home

I decided to investigate so I downloaded a free network tracing tool, Ethereal, to a computer on which the player was installed and captured network traffic during the Player’s startup. A quick look through the trace log confirmed the users comment: the Player does send an ID to a Sony web site.

[Ed.- Those darned bloggers- something must be done about them at once!]

Time to patch your Cisco routers

Three months after the scandal at the Black Hat conference, Cisco finally confirmed the existence of some serious vulnerabilities that Michael Lynn warned about when he demonstrated the ability to hack in to Cisco routers back in July. While the specifics were never made clear during the Black Hat conference, it was thought that Cisco had already fixed the issues with their IPv6 patch but now it's clear that the problems affecting Cisco IOS were much deepe

Australian Government to Crack Down on Computer Zombies

  • LinuxElectrons; By ByteEnable (Posted by tuxchick on Nov 6, 2005 11:36 PM EDT)
  • Story Type: News Story
“The Australian Communications and Media Authority (ACMA) and five Internet Service Providers (ISPs) have joined forces to pilot a system to identify zombie computers, notify the unfortunate owners and help them take appropriate action quickly.

Many ISPs have expressed an interest in participating in the project. Five ISPs have agreed to participate in a pilot project: Telstra Bigpond, Optus Internet, Westnet, Pacific Internet and West Australian Network.

[Ed.- Good luck explaining things to unsophisticated users.]

MIT maps wireless users across campus

MIT's newly upgraded wireless network -- extended this month to cover the entire school -- doesn't merely get you online in study halls, stairwells or any other spot on the 9.4 million square foot campus. It also provides information on exactly how many people are logged on at any given location at any given time. It even reveals a user's identity if the individual has opted to make that data public.

Need open source insurance?

  • ZDNet; By Dana Blankenhorn (Posted by tuxchick on Nov 6, 2005 9:38 PM EDT)
  • Story Type: Editorial
So let's sum up. A high price for minimal coverage, for a risk with limited documented history of losses. It's your call.

Explaining the Google Print Library Project

  • Groklaw; By Pamela Jones (Posted by tuxchick on Nov 6, 2005 8:01 PM EDT)
  • Story Type: News Story
You may be aware of the firestorm of protest from authors and publishers, including two lawsuits, over Google's new Print Library Project... Because I wrote an article for LWN in September about this project and the Author's Guild lawsuit against Google, I know that those accusations are not factually true. For that reason, I decided to republish the information here, because it explains how this project really works and what the legal arguments are on both sides. Google Print Library does not work at all the way it is described by Ms. Schroeder and Mr. Barr, as you will see. While there are arguments to be made on both sides, it is vital in any discussion to be accurate on the facts. So with that goal in mind, here is the result of my research on how Google Print Library really works.

[Ed.- Pamela Jones vs. Rampant Hyperbole and Hysteria. Go, Pamela, go!]

Mozilla Firefox 100 Million Downloads Celebration Image Contest Winners Announced

Thanks to everyone that shared in the celebration and shared photos of yourself with the 100 Million Downloads celebratory banner. We received nearly 200 photos and so it was very difficult for the SFX team to pick just ten winners. Actually, it was so difficult that we couldn't do it. The best we could do was to narrow it down to 17 winners (and we selected an 18th as the clear peoples' choice winner based on comments and views.)

Most of the photos fell into some basic categories so we're awarding a first place prize and runners up in these five categories: Nice Photos, Artistic, Group Pics, Best Desk, and Way Too Enthusiastic ;-)

Suspected bot master busted

  • Security Focus; By Robert Lemos (Posted by tuxchick on Nov 6, 2005 5:05 PM EDT)
  • Story Type: News Story
Federal authorities arrested a 20-year-old California man on Thursday, accusing him of creating bot software to compromise nearly 400,000 Windows computers and using his control of the systems to garner more than $60,000 in profits.

[Ed.- What a criminal mastermind- he vandalized 400,000 PCs for a measly $60k? Way to go, schmuck. Just like causing a thousand dollars' worth of damage to steal a car stereo you'll hock for $40.]

How to outsmart automated phone systems

  • Seattle Times; By Jolayne Houtz and Emily Heffter (Posted by tuxchick on Nov 6, 2005 3:34 PM EDT)
  • Story Type: News Story
To help you escape from automated phone purgatory, The Seattle Times has compiled a consumer's guide for thwarting the phone systems at about 60 local and national companies and government agencies. We spent more than 2 ½ hours on hold while experimenting with various tricks to bypass the phone menus, voice prompts and automated routing systems to reach a human.

Is it time for Sony to recall their rootkit DRM music Cd's?

If you have not been following this story, it's time you did, as there are some 20 music Cd's out there published by Sony/BMG, that contain this malware they are calling a DRM solution concocted for them by by First 4 Internet. Be warned that once your PC is infected, it is difficult or maybe impossible to remove the code from your computer without causing damage to your system, such as rendering your CD drive inaccessible. In addition to hiding hacks, if your PC is infected with this DRM you can also be setting yourself up for new viruses that your scanner will not detect as the same trick can be used by virus writers to cloak the code from your anti virus protection program. As Airhead sarcastically said in his news submittal on this subject: "Good job Sony"

The Linux Sysadmin's Essential Bookshelf

A system administrator pretty much has to be able to do anything- network voodoo, user education, pull cable, build servers, fix hardware, fend off clueless management, and myriad more tasks. With these in mind, here is my own Essential Bookshelf for the Hardworking, Underappreciated, Overworked, Conscientious Sysadmin.

Avoiding Oblivion in Your Tech Career

  • O'Reilly Network; By Mike Havey (Posted by tuxchick on Nov 6, 2005 8:28 AM EDT)
  • Story Type: Tutorial
Where are you headed in your technology career? If Shakespeare is correct in his renowned soliloquy on the seven phases of life in As You Like It, you stand to lose your sense of taste, your eyesight, and your teeth. Life moves quickly for the technologist: one day, you're a reticent rookie whose broken code generates core dumps; the next, you are the center of attention and the slickest talker in the design review session. But ultimately, you fade into old age and fall apart like some antiquated IT system: a curious relic with no value and in need of maintenance.

[Ed.- Don't let the lead scare you- the author tells how to avoid becoming old, toothless, and unwanted. At least in your career.]

What business can learn from open source

I think the most important of the new principles business has to learn is that people work a lot harder on stuff they like. Well, that's news to no one. So how can I claim business has to learn it? When I say business doesn't know this, I mean the structure of business doesn't reflect it.

Business still reflects an older model, exemplified by the French word for working: travailler. It has an English cousin, travail, and what it means is torture.

[Ed.- No kidding!!]

Networking 101: Understanding IP Addresses

  • Enterprise Networking Planet; By Charlie Schluting (Posted by tuxchick on Nov 6, 2005 6:34 AM EDT)
  • Story Type: Tutorial
Networks don't work without addresses: Whenever you are sending something, you need to specify where it should go and where it came from. To be an effective network engineer or administrator, you need to understand IP addresses backward and forward: you need to be able to think on your feet. If something breaks, likely as not some address assignment has been screwed up. And spotting the problem quickly is likely to be the difference between being the hero, or the guy who "takes a long time to fix the problem." Before covering subnetting in the next Networking 101 installment, we'd like to thoroughly explore IP addresses in their primal form. This is crucial to understanding subnets.

[Ed.- This should be a great series. Stay tuned for more.]

« Previous ( 1 ... 76 77 78 79 80 81 82 83 ... 84 ) Next »