Certification: Test Your Knowledge of Wireless Technology Emmett Dulaney Think you�re ready to sign up for the CWNA (Certified Wireless Network Administrator) exam or one similar to it? Before you do, test your knowledge of wireless technology � and readiness for such a certification test � with this sample exam of questions on basics of the technology. Tue, 28 Feb 2006
Marcel's Linux Game of the Month: Childsplay Marcel Gagné Childsplay is an engine that handles plugins, each game being a plugin. The games are geared for an age range from 2-7. As such, they are all fairly simple for the readers of this column but somewhat more challenging for your young children. Fri, 24 Feb 2006
Regular Expressions: Subtleties of good style Cameron Laird, Kathryn Soraiz You're experienced enough to recognize immediately how to gloss that slogan � when working in a new programming language, one ought to be respectful of it, alert to novel idioms that were impossible or contrived in the language(s) you used before. Overly literal translations are a mistake; you don't want to do the software equivalent of the apocryphal hotel notice that reads, in English, "You will be unbearable while the lift is repaired." "Regular Expressions" has covered exactly this topic several times already. Fri, 24 Feb 2006
Book Review: Pro Perl Debugging Reinhard Voglmaier Richard Foley and Andy Lester, the authors of Pro Perl Debugging, are well known in the Perl community; they have contributed actively through the many software modules they've developed and the number of articles they've written. Their writing in this book is based on many years of Perl programming experience. Tue, 21 Feb 2006
Book Review: Math You Can't Use Peter Salus That quaint document, the U.S. Constitution, Article 1, clause 8, is the foundation for patent and copyright law (though neither word is employed). Its foundations can be traced (for patents) to the Statute of Monopolies of 1654, wherein Parliament "endowed" inventors to sole rights in their inventions for 14 years, and (for copyright) to the "Statute of Anne" of 1710. Tue, 21 Feb 2006
Security: Linux Kernel Security in a Nutshell Kristy Westphal Recently, I started looking more closely at some of the security add-ons for Linux and was surprised to find so many kernel-related projects out there. I first looked at SELinux from the NSA (http://www.nsa.gov/selinux/), which has been around for many years and has gained notice again since it has been enabled in the Fedora kernel by default. I thought this was a unique project but quickly realized that there were many others! There are plenty of worthy kernel projects out there, and many of them are not new. Now that I have been enlightened, I will share some of what I've learned. In this article, I'll just give an overview of what's out there, but look for future, more detailed articles about their use. Fri, 17 Feb 2006
Book Review: Intrusion Prevention Fundamentals Emmett Dulaney Intrusion Prevention Fundamentals focuses on how Intrusion Prevention Systems (IPS) technologies can be used to manage the network and keep intruders out. IPS are any monitoring systems that examine all network traffic and then act as forwarding devices for approved traffic (dropping unapproved traffic or forwarding it elsewhere for further/separate action). Tue, 14 Feb 2006
Book Review: Penetration Testing and Network Defense Emmett Dulaney In the world of systems security, administrators must stay current on all the ever changing approaches to securing their systems. Penetration testing is one such recent addition to the field. Simply defined, penetration testing involves ethically hacking a network to find vulnerabilities and subsequently taking action to close them. In other words, you attack your own network and find the weaknesses in it before someone else does. Tue, 14 Feb 2006
Certification: Examining the CWNA Certification from Planet3 Wireless Emmett Dulaney When CompTIA � the organization behind a surplus of certifications ending with a plus sign (A+, Network+, Server+, etc.) � abandons their plans to release a new exam, it is usually a sign of one of two things: either the market is not big enough to support it, or someone else has effectively beaten them to the punch. While I cannot speak for CompTIA, I have to guess that the latter is what happened when it came to wireless networking. While they were busy formulating objectives for what was to be called Wireless+, Planet3 Wireless, Inc. beat them to the punch with the CWNA (Certified Wireless Network Administrator) certification. Tue, 7 Feb 2006
Book Review: Time Management for System Administrators Matthew Cheek From the first chapter, it is clear that Tom Limoncelli is a working systems administrator who has spent years in the trenches. Tue, 7 Feb 2006
Tool of the Month: Privoxy Joe "Zonker" Brockmeier Like many sys admins, I spend a lot of time browsing the Internet. Probably too much, but that's one of the occupational hazards of being in front of a computer all day. After spending this much time at the computer, I'm heartily sick of animated banner ads, sites trying to set cookies behind my back, various JavaScript annoyances, and so forth. Now, Firefox does a brilliant job of smacking down a lot of pop-ups and other JavaScript annoyances and can take care of some of the cookie issues, but I wanted something in addition to Firefox. That's where Privoxy comes in. Privoxy is based on Internet Junkbuster but includes a number of improvements and new features. Tue, 21 Jun 2005
Book Review: Beginning MySQL Database Design and Optimization Russell Dyer Apress is fairly new to the open source book publishing business. However, in a short amount of time they've put together a nice collection of books. They've done this by buying many titles from Wrox Press, but more importantly by seeking out some good writers with expertise in their field to write new books. So, if you're not familiar with Apress books, you might want to take a look at them. As part of their expansion into the open source arena, they've been publishing some new books on MySQL. One book that I found to be very interesting is Beginning MySQL Database Design and Optimization by Jon Stephens and Chad Russell. Tue, 28 Jun 2005
Regular Expressions: As Time Goes By Cameron Laird 'Have the time? Often, as developers, having the time is difficult. We don't mean just that schedules are hard to meet � though that's true � but that temporal calculations such as, "give up on this look-up if it takes more than ten seconds" or "set a deadline based on a date as entered by the end-user" or "tell the customer that his documents will be shipped after three business days", turn out to be far harder to program than an outsider might expect. Why the complexity? What can we do about it? Mon, 30 Aug 2004
Book Review: Intrusion Prevention Fundamentals Emmett Dulaney Intrusion Prevention Fundamentals focuses on how Intrusion Prevention Systems (IPS) technologies can be used to manage the network and keep intruders out. IPS are any monitoring systems that examine all network traffic and then act as forwarding devices for approved traffic (dropping unapproved traffic or forwarding it elsewhere for further/separate action). Tue, 14 Feb 2006
Book Review: Introduction to Computer Security Peter Salus A while ago, I reviewed Bishop's massive (1100 pages!) Computer Security (;login:, April 2003). Introduction to Computer Security � a mere two-thirds the size � is a revised and cut-down version. As near as I can tell, Bishop has removed much of the mathematics and some of the explanatory material; the two chapters (on assurance) by Elizabeth Sullivan have been retained. Mon, 29 Nov 2004
Find white papers, case studies, Webcasts and analyst reports on everything from design through development to testing and implementation at Unix Review's Research Papers and Reports.
Lowering Datacenter TCO through Virtualization To dramatically lower datacenter costs and improve competitive advantage, IT organizations should examine the cost and competitive-advantage drivers in their current infrastructure. Egenera has studied several Global 1000 organizations and uncovered similarities in their cost structures.
Server Consolidation through Utility Computing Server consolidation is a top priority for IT management. This paper, based on the experience of Egenera, a supplier of enterprise-class servers, provides a roadmap for driving consolidation in your organization, and answers the question most often asked by our customers: "How do we get started?"
|
|
|
Learn how to recover critical data from the RAID storage experts at DataRAID. DataRAID provides RAID data recovery and salvaging services for hard disk drives and RAID arrays to recover critical data from failed servers.
|
|
|
|
|
|
Subscribe to THE journal for UNIX systems administrators. Receive 45% off your subscription by following the link below:
|
|
|
Sys Admin and The Perl Journal CD-ROM version 11.0
Version 11.0 delivers every issue of Sys Admin from 1992 through 2005 and every issue of The Perl Journal from 1996-2002 in one convenient CD-ROM!
Order now!
|
|
|
|
|
|