Old Articles: <Older 41-50 Newer> |
|
Linux Journal October 2000 |
Book Review While W. Curtis Preston's experience is mostly in medium to large shops, and the book has a wealth of information for such shops, rest assured you can use UNIX Backup and Recovery even if all you have to back up is your own desktop computer... |
Salon.com September 1, 2000 Rachel Chalmers |
Guru of the Unix gurus A year after his death, the programming community still treasures the influence of Rich Stevens. |
T.H.E. Journal September 2000 |
Sun Microcomputer Systems Unlike desktop computers that require an operating system and applications running locally on the desktop, the low-cost Sun Ray systems' thin client-style configuration allows users instant access to multimedia, applications and information resources from anywhere on the network |
Unix Insider September 2000 Jim Mauro |
Scheduling in the user threads library User level threads in Solaris implement a priority scheme and queue-management system distinct from the kernel thread priorities and per-processor dispatch queues that exist in the kernel. This month, Jim Mauro lays the groundwork for discussion on the internals of the threads library, relative to scheduling and thread priorities. |
Unix Insider August 2000 Mo Budlong |
Using cron basics Cron allows you to program jobs to be performed at specific times or at steady intervals. This month Mo Budlong explains some cron fundamentals and runs an experiment. |
RootPrompt.org August 23, 2000 Noel |
OpenBSD's Good Example OpenBSD has done a lot of things right and there are some things that the Linux community should study and emulate. Principles the OpenBSD developers are following such as "Secure by Default mode" and code auditing are things that we should be doing to Linux. |
Unix Insider August 2000 Peter Baer Galvin |
Debugging a performance problem This month, Pete solves a performance problem using Solaris tools and reviews the second edition of Building Internet Firewalls. |
RootPrompt.org August 14, 2000 |
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. |
RootPrompt.org August 9, 2000 |
Improving whois In 1999 the domain name system started distributing the whois information among the different domain-registrars. This caused a change in how the whois command is used. In this article I review three tools that replace the whois command or make whois easier to use. |
RootPrompt.org August 7, 2000 |
The Danger of Script Kiddies There has often been a tendency among System Administrators to discount the danger of script kiddies, and this can be a misleading and dangerous thing to do. Script kiddies can have a much greater capability to cause problems then their skills alone would indicate. |
<Older 41-50 Newer> Return to current articles. |