Showing headlines posted by tuxchick
« Previous (
1 ...
76
77
78
79
80
81
82
83
...
84
)
Next »
As a Linux community member, I have the right to do charitable work centered around giving my time away for the cause of Free Software...The GPL guarantees that our gifts will have the longevity they deserve.
Replacing ms dns with bind9 is an better idea here is why:
1.It's really faster (noticed when i run first query on that machine and had lower latency)
2.Better security (windows2k is not supported with patches in future)
3.You can migrate easily to linux after that ;)
[Ed.- This is a good quickstart. Please do the Internet a favor and study the BIND documentation thoroughly.]
Hi, and welcome to the third in a series of articles on Security Enhanced Linux. My first SELinux article detailed the background of SELinux, while my second article in the series discussed how SELinux makes access decisions. This week, I'll talk about how an SELinux system differs from a standard Linux system in terms of administration. Most of what you already know about Linux system administration will still apply to an SELinux system, but there are some additions and changes that are critical to understand when using SELinux.
UNIX was a terrific workhorse for its time, but eventually the old nag needs to be put out to pasture. David Chisnall argues that it's time to retire UNIX in favor of modern systems with a lot more horsepower.
Web comics are the next incarnation of traditional cartoons. And while the medium in which they are published has changed, the idea of comics making commentary still stays the same. Today, some Web comic creators use their comic to promote Linux advocacy.
Two of the better known Web comics, User Friendly and General Protection Fault, have used Linux and open source as inspiration for many of their story lines.
[Ed.- Don't miss this hilarious interview. Just like The Daily Show, you find more truth in the comics than in the news.]
This section is aimed at all those who have no or limited Linux experience, and are unfamiliar with software repositories. It occurred to me that novice Linux users are often at a loss where to get software, and the next thing that happens is that they manage to find some rpm file somewhere on the internet, and run into what is aptly called 'dependency hell' (for Linux insiders: note the pun! Ah well, I'm not good with those anyway..). So I decided to put up a couple of paragraphs about software installation, and clear up a few puzzling points.
[Ed.- great article- only please, for the love of $deity and readability, lose the text-scrolling-over-fixed background. Ow.]
I decided to investigate so I downloaded a free network tracing tool, Ethereal, to a computer on which the player was installed and captured network traffic during the Player’s startup. A quick look through the trace log confirmed the users comment: the Player does send an ID to a Sony web site.
[Ed.- Those darned bloggers- something must be done about them at once!]
Three months after the scandal at the Black Hat conference, Cisco finally confirmed the existence of some serious vulnerabilities that Michael Lynn warned about when he demonstrated the ability to hack in to Cisco routers back in July. While the specifics were never made clear during the Black Hat conference, it was thought that Cisco had already fixed the issues with their IPv6 patch but now it's clear that the problems affecting Cisco IOS were much deepe
“The Australian Communications and Media Authority (ACMA) and five Internet Service Providers (ISPs) have joined forces to pilot a system to identify zombie computers, notify the unfortunate owners and help them take appropriate action quickly.
Many ISPs have expressed an interest in participating in the project. Five ISPs have agreed to participate in a pilot project: Telstra Bigpond, Optus Internet, Westnet, Pacific Internet and West Australian Network.
[Ed.- Good luck explaining things to unsophisticated users.]
MIT's newly upgraded wireless network -- extended this month to cover the entire school -- doesn't merely get you online in study halls, stairwells or any other spot on the 9.4 million square foot campus. It also provides information on exactly how many people are logged on at any given location at any given time. It even reveals a user's identity if the individual has opted to make that data public.
So let's sum up. A high price for minimal coverage, for a risk with limited documented history of losses. It's your call.
You may be aware of the firestorm of protest from authors and publishers, including two lawsuits, over Google's new Print Library Project... Because I wrote an article for LWN in September about this project and the Author's Guild lawsuit against Google, I know that those accusations are not factually true. For that reason, I decided to republish the information here, because it explains how this project really works and what the legal arguments are on both sides. Google Print Library does not work at all the way it is described by Ms. Schroeder and Mr. Barr, as you will see. While there are arguments to be made on both sides, it is vital in any discussion to be accurate on the facts. So with that goal in mind, here is the result of my research on how Google Print Library really works.
[Ed.- Pamela Jones vs. Rampant Hyperbole and Hysteria. Go, Pamela, go!]
Thanks to everyone that shared in the celebration and shared photos of yourself with the 100 Million Downloads celebratory banner. We received nearly 200 photos and so it was very difficult for the SFX team to pick just ten winners. Actually, it was so difficult that we couldn't do it. The best we could do was to narrow it down to 17 winners (and we selected an 18th as the clear peoples' choice winner based on comments and views.)
Most of the photos fell into some basic categories so we're awarding a first place prize and runners up in these five categories: Nice Photos, Artistic, Group Pics, Best Desk, and Way Too Enthusiastic ;-)
Federal authorities arrested a 20-year-old California man on Thursday, accusing him of creating bot software to compromise nearly 400,000 Windows computers and using his control of the systems to garner more than $60,000 in profits.
[Ed.- What a criminal mastermind- he vandalized 400,000 PCs for a measly $60k? Way to go, schmuck. Just like causing a thousand dollars' worth of damage to steal a car stereo you'll hock for $40.]
To help you escape from automated phone purgatory, The Seattle Times has compiled a consumer's guide for thwarting the phone systems at about 60 local and national companies and government agencies. We spent more than 2 ½ hours on hold while experimenting with various tricks to bypass the phone menus, voice prompts and automated routing systems to reach a human.
If you have not been following this story, it's time you did, as there are some 20 music Cd's out there published by Sony/BMG, that contain this malware they are calling a DRM solution concocted for them by by First 4 Internet. Be warned that once your PC is infected, it is difficult or maybe impossible to remove the code from your computer without causing damage to your system, such as rendering your CD drive inaccessible. In addition to hiding hacks, if your PC is infected with this DRM you can also be setting yourself up for new viruses that your scanner will not detect as the same trick can be used by virus writers to cloak the code from your anti virus protection program. As Airhead sarcastically said in his news submittal on this subject: "Good job Sony"
A system administrator pretty much has to be able to do anything- network voodoo, user education, pull cable, build servers, fix hardware, fend off clueless management, and myriad more tasks. With these in mind, here is my own Essential Bookshelf for the Hardworking, Underappreciated, Overworked, Conscientious Sysadmin.
Where are you headed in your technology career? If Shakespeare is correct in his renowned soliloquy on the seven phases of life in As You Like It, you stand to lose your sense of taste, your eyesight, and your teeth. Life moves quickly for the technologist: one day, you're a reticent rookie whose broken code generates core dumps; the next, you are the center of attention and the slickest talker in the design review session. But ultimately, you fade into old age and fall apart like some antiquated IT system: a curious relic with no value and in need of maintenance.
[Ed.- Don't let the lead scare you- the author tells how to avoid becoming old, toothless, and unwanted. At least in your career.]
I think the most important of the new principles business has to learn is that people work a lot harder on stuff they like. Well, that's news to no one. So how can I claim business has to learn it? When I say business doesn't know this, I mean the structure of business doesn't reflect it.
Business still reflects an older model, exemplified by the French word for working: travailler. It has an English cousin, travail, and what it means is torture.
[Ed.- No kidding!!]
Networks don't work without addresses: Whenever you are sending something, you need to specify where it should go and where it came from. To be an effective network engineer or administrator, you need to understand IP addresses backward and forward: you need to be able to think on your feet. If something breaks, likely as not some address assignment has been screwed up. And spotting the problem quickly is likely to be the difference between being the hero, or the guy who "takes a long time to fix the problem." Before covering subnetting in the next Networking 101 installment, we'd like to thoroughly explore IP addresses in their primal form. This is crucial to understanding subnets.
[Ed.- This should be a great series. Stay tuned for more.]
« Previous ( 1 ...
76
77
78
79
80
81
82
83
... 84
) Next »