MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Computers & Electronics / Unix

Magazine articles on Unix.
Old Articles: <Older 41-50 Newer>
Linux Journal
October 2000
Book Review While W. Curtis Preston's experience is mostly in medium to large shops, and the book has a wealth of information for such shops, rest assured you can use UNIX Backup and Recovery even if all you have to back up is your own desktop computer... mark for My Articles 344 similar articles
Salon.com
September 1, 2000
Rachel Chalmers
Guru of the Unix gurus A year after his death, the programming community still treasures the influence of Rich Stevens. mark for My Articles 17 similar articles
T.H.E. Journal
September 2000
Sun Microcomputer Systems Unlike desktop computers that require an operating system and applications running locally on the desktop, the low-cost Sun Ray systems' thin client-style configuration allows users instant access to multimedia, applications and information resources from anywhere on the network mark for My Articles 202 similar articles
Unix Insider
September 2000
Jim Mauro
Scheduling in the user threads library User level threads in Solaris implement a priority scheme and queue-management system distinct from the kernel thread priorities and per-processor dispatch queues that exist in the kernel. This month, Jim Mauro lays the groundwork for discussion on the internals of the threads library, relative to scheduling and thread priorities. mark for My Articles 59 similar articles
Unix Insider
August 2000
Mo Budlong
Using cron basics Cron allows you to program jobs to be performed at specific times or at steady intervals. This month Mo Budlong explains some cron fundamentals and runs an experiment. mark for My Articles 10 similar articles
RootPrompt.org
August 23, 2000
Noel
OpenBSD's Good Example OpenBSD has done a lot of things right and there are some things that the Linux community should study and emulate. Principles the OpenBSD developers are following such as "Secure by Default mode" and code auditing are things that we should be doing to Linux. mark for My Articles 1350 similar articles
Unix Insider
August 2000
Peter Baer Galvin
Debugging a performance problem This month, Pete solves a performance problem using Solaris tools and reviews the second edition of Building Internet Firewalls. mark for My Articles 42 similar articles
RootPrompt.org
August 14, 2000
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. mark for My Articles 107 similar articles
RootPrompt.org
August 9, 2000
Improving whois In 1999 the domain name system started distributing the whois information among the different domain-registrars. This caused a change in how the whois command is used. In this article I review three tools that replace the whois command or make whois easier to use. mark for My Articles 27 similar articles
RootPrompt.org
August 7, 2000
The Danger of Script Kiddies There has often been a tendency among System Administrators to discount the danger of script kiddies, and this can be a misleading and dangerous thing to do. Script kiddies can have a much greater capability to cause problems then their skills alone would indicate. mark for My Articles 48 similar articles
<Older 41-50 Newer>    Return to current articles.