oreilly.comSafari Books Online.Conferences.

advertisement > Sys Admin Articles

Sys Admin Articles

Fun with Xorg by Dru Lavigne
Xorg includes several useful utilities and features that almost no one knows about. You can accelerate your display, nest one X server in another, distribute your session across multiple monitors on different machines, and watch a session on another machine. Dru Lavigne explains. Dec. 7, 2006

Virtualization and the POWER5 Architecture by Ken Milberg
Virtualization is a trendy topic in the server room now, especially as commodity computers begin to support features that mainframes have had for decades. Mainframes aren't standing still, however; IBM's POWER5 architecture supports powerful virtualization features on AIX... and Linux. Ken Milberg describes some of the benefits of the recent work on this platform. Nov. 22, 2006

Four Tough Lessons of System Recovery by KIVILCIM Hindistan
KIVILCIM Hindistan recently migrated to a new laptop and promptly destroyed his partition table. Flailing around with false laziness taught him the true value of true laziness. Here's a real-life tale of Knoppix rescue and a cautionary tale about troubleshooting. Aug. 31, 2006

Managing Disk Space with LVM by Bryce Harrington
Linux's Logical Volume Manager (LVM) allows you to create virtual disk partitions out of one or more hard drives. This makes it easy to manage growth in filesystems. Combined with RAID, it provides a nearly unbeatable way to keep your files safe and available. Bryce Harrington and Kees Cook show how to configure LVM, how to combine it with RAID, and how to use it on desktop machines too. Apr. 27, 2006

Installing Software on Debian by Edd Dumbill
Debian GNU/Linux is a powerful and popular community-developed Linux distribution--and the basis for several other useful and usable distributions. One of the reasons for its popularity is the ease of installing and maintaining software. Edd Dumbill, Debian developer and GNU/Linux advocate, shows how to use Debian's tools to find and install software packages. Apr. 6, 2006

Secure Your Linux Server by Aaron Brazell
Linux is a powerful and popular operating system kernel. That popularity means you might be running it even if you're not a dedicated Unix administrator or high-powered programmer. That doesn't mean that rock-solid security is out of your reach, though. Aaron Brazell shows how to make Red Hat 9 (and other Linux distributions) much more secure in a few easy steps. Mar. 23, 2006

Virtualization with FreeBSD Jails by Dan Langille
Consolidating several small machines into one powerful one has advantages in administration and resource usage. It also has implications for security and encapsulation. FreeBSD's jails feature allows you to host multiple separate services on a single machine while keeping them securely separate. Dan Langille shows how. Mar. 9, 2006

Fine-Tuning Kubuntu by Carla Schroder
Ubuntu is a well-maintained, well-organized Linux distribution. Kubuntu adds the popular and powerful KDE desktop environment. As nice as Kubuntu is, the default installation doesn't fit every user. Carla Schroder shows how to get help, get access to more software packages, set up a firewall, and review and get rid of unnecessary services. Mar. 9, 2006


Linux Virtualization with Xen by Kris Buytaert
Virtualization is an old idea--running multiple distinct operating systems atop a powerful box has a lot of advantages. Xen is a new virtualization platform. Despite its youth, its Linux support is very good. Kris Buytaert explains the basics of virtualization and shows how to configure and install Xen and to create new virtual machines. Jan. 26, 2006

Using the Root Account on Debian by Edd Dumbill
Debian GNU/Linux is a powerful and popular community-developed Linux distribution--and the basis for several other useful and usable distributions. With the recent release of Debian Sarge, it's better than ever. Edd Dumbill, Debian developer and GNU/Linux advocate, shows how to use the root account safely and responsibly. Dec. 1, 2005

Using Software RAID-1 with FreeBSD by Dru Lavigne
Disk space is cheap, and putting multiple disks in a computer is relatively cheap. Taking advantage of redundant disks to protect against hardware failure is invaluable. Though some RAID solutions require special hardware, FreeBSD 5.0 and later support software RAID. Dru Lavigne shows how to configure and enable disk mirroring. Nov. 10, 2005

Building Detailed Network Reports with Netflow by Michael W. Lucas
You can trace every packet on your network from source to destination, if you really want to. Having all of this information is useless unless you can actually find what you need to know. Netflow not only helps record traffic information but also can help you report on just the types of packets you want. Michael W. Lucas demonstrates. Oct. 27, 2005

Using FreeBSD's ACLs by Dru Lavigne
The standard Unix permissions scheme works fine if you have simple needs, but juggling groups and users can grow unwieldy very quickly. FreeBSD's Access Control Lists give you more control over who can access files and directories. Dru Lavigne explains how to enable, understand, and use them appropriately. Sep. 22, 2005

Improving Network Reliability with Keepalived by Philip Hollenback
No matter how good the software, hardware eventually fails. Redundancy is an important way to keep your important services running smoothly. With the right software, you can even sleep through otherwise catastrophic network failures. Philip Hollenback demonstrates how to make your network robust by using Keepalived on multiple Linux routers. Sep. 1, 2005

HA-OSCAR: Five Steps to a High-Availability Linux Cluster by Ibrahim Haddad
Clustering, the current thinking in computing, addresses the availability and scaled performance in cost-effective equipment. There are several open source clustering stacks, but HA-OSCAR is one of the few to address high availability with many built-in characteristics that allow continuous service availability. In this tutorial targeted for system administrators, engineers, researchers, and even students interested in leaning about building HA clusters, Ibrahim Haddad provides a step-by-step guide on how to install and build a highly available Linux cluster with HA-OSCAR. Feb. 3, 2005

Feather Linux: The Swiss Army Knife of LiveCDs by KIVILCIM Hindistan
Bootable LiveCDs have made the lives of Linux dabblers easier. They're also good for administrators and people facing system recovery woes. Among LiveCDs, Feather Linux is a lean and powerful tool. KIVILCIM Hindistan demonstrates how it can make backing up and restoring partitions easy. Nov. 11, 2004

USENIX 2003 by Dustin Puryear
USENIX's annual technical conference took place last month in Texas. Dustin Puryear was on the scene. What's surprising? Microsoft's presence, meeting the needs of Unix administrators. Jul. 17, 2003

Unfinished Business: The One Missing Piece by David HM Spector
With all of the work done on Linux in the past few years, there's only one missing piece preventing widespread adoption in the enterprise -- directory services. David HM Spector explores the history and current state of directory services, explaining why it's important to interoperate with Active Directory. Apr. 28, 2003

Staying Current with NetBSD by Michael W. Lucas
Open source never stands still. Even the flexible and mature BSDs are continuing to evolve. In this article, Michael Lucas looks at the NetBSD upgrade process, demonstrating the most common steps to stay abreast of the current source code. Apr. 10, 2003

Using NFS for Networked Backups by Glenn Graham
As mass storage prices continue to fall, making backups to a centralized server starts to look convenient. Of course, the mechanics of this situation can be tricky. Glenn Graham demonstrates a quick and easy solution using NFS. Mar. 6, 2003

Creating Systrace Policies by Michael W. Lucas
The systrace project is spreading from Open and NetBSD to other free Unixes. Having introduced systrace in a previous column, Michael Lucas demonstrates how to write a systrace policy from scratch -- or use an existing one. Feb. 27, 2003

Systrace Policies by Michael W. Lucas
NetBSD and OpenBSD have an interesting new system policy manager called systrace. With the proper policies, system administrators can control which system calls can be made and how. Michael Lucas explains how this works and how to understand -- and write -- a good policy file. Jan. 30, 2003

Synchronizing Networks with NTP by Glenn Graham
Accurate timekeeping is vital to accurate records, and accurate logs are the mainstay of good system administration. Glenn Graham explains NTP (the Network Time Protocol) and how to put it to work on your network. Jan. 2, 2003

VPNs and IPSec Demystified by Dru Lavigne
How do you allow remote users to access resources on your network securely over an insecure connection? With a VPN. Never fear, Dru Lavigne's latest Cryptosystems column explains the concepts and terminology behind the technology. Dec. 12, 2002

Samba Pushes the Boundaries Again by Dustin Puryear
With version 2.2 stable and well-deployed version Samba 3.0 just around the corner, the Samba team has been very busy. In this article, Dustin Puryear explores some of the new and surprising features in recent builds. Dec. 5, 2002

Cryptosystems: Configuring SSH by Dru Lavigne
Cryptosystems are handy, but they're not for everyone right out of the box. In her second article on SSH, Dru Lavigne explores some of the more common configuration options for clients and servers. Nov. 28, 2002

Single-User Subversion by Rafael Garcia-Suarez
Revision control isn't just for distributed, multi-developer teams. Rafael Garcia-Suarez introduces Subversion and explains how to use it for personal projects. Oct. 31, 2002

Gentoo Linux Reloaded by Daniel Robbins
Over the past year, Gentoo Linux has grown from a niche distribution into something of a phenomenon in the Linux world. In this article, Gentoo Linux chief architect Daniel Robbins explains what Gentoo Linux is all about, describing the good things found in Gentoo Linux 1.4. Oct. 10, 2002

Who Has Which Files by Michael W. Lucas
Michael Lucas tackles the problem of unmounting a busy filesystem. Determine who the culprits are who are holding the files open using fstat. Sep. 26, 2002

Sudo Aliases and Exclusions by Michael W. Lucas
The hardest part to using sudo is configuring sudoers, its permissions file. Michael Lucas shows how to simplify sudo maintenance and clean up your sudo configuration using aliases. Sep. 12, 2002

Eliminating Root with Sudo by Michael W. Lucas
As the system administrator, you're stuck between deciding to hand out the root password or doing everything for your users. A third solution is sudo. This article shows you how to implement sudo, which you may already have, since it is integrated into OpenBSD and Mac OS X and is an add-on package for just about every other Unix-like operating system out there. Aug. 29, 2002

Using Groups to Eliminate Root by Michael W. Lucas
Strategic use of groups can eliminate the need to give the root password to people, but still allow them to do their job. Aug. 15, 2002

Understanding FreeBSD Disklabels by Michael W. Lucas
A disklabel is a file at the beginning of a disk that indicates where each BSD-style partition begins and how many disk sectors it occupies.  Jun. 27, 2002

A Batch Job to Add New User IDs by Arnold Robbins
Arnold Robbins, coauthor of O'Reilly's "Learning the Korn Shell, 2nd Edition," shows a script to automate adding many user IDs at once.  May. 9, 2002

Optimizing Disk Subsystems for Random I/O by Gian-Paolo D. Musumeci
This case study in optimizing disk subsystems shows how to write a program to simulate workload and select an appropriate disk array technology.  May. 2, 2002

System Panics, Part 2: Recovering and Debugging by Michael W. Lucas
In Michael Lucas' last column, he showed us how to prepare a FreeBSD system in case of a panic. In Part 2, he explains how to get some useful information if you do suffer a system crash. Apr. 4, 2002

Application I/O Pattern Analysis by Gian-Paolo D. Musumeci
This case study in performance analysis shows how a little Perl can help identify I/O patterns. Mar. 28, 2002

System Panics, Part 1: Preparing for the Worst by Michael W. Lucas
System panics are an admin's worst nightmare. They are difficult to diagnose and often harder to fix, requiring developer intervention. The more information you have available, the easier it is to recover from a panic. Michael Lucas shows us how to prepare a FreeBSD system in case of a panic. Mar. 21, 2002

Find: Part Two by Dru Lavigne
The find utility can do more that just locate files. Dru Lavigne shows us how to make it delete files, create file archives, and much, much more. Mar. 14, 2002

Cache-Friendly Web Pages by Jennifer Vesperman
Caching saves time and bandwidth. Here are some of the advantages of caching, as well as an example of how to set up cache headers in Apache, focusing on the Expires and Cache-Control headers. Mar. 7, 2002

Improving Compilation Times: A Case Study in Performance Analysis by Gian-Paolo D. Musumeci
This hypothetical case study plans a tuning strategy for reducing compilation times, based on the system's workload and the potential bottlenecks associated with memory consumption, CPU usage, and disk I/O. Feb. 21, 2002

Finding Things in Unix by Dru Lavigne
Dru Lavigne introduces us to the some of the powerful features hidden in the Unix find command. Feb. 21, 2002

Understanding NFS by Michael W. Lucas
Michael Lucas introduces us to the world of network filesharing for Unix. Feb. 14, 2002

Browsing through the Ports Collection by Dru Lavigne
FreeBSD Basics columnist Dru Lavigne explores some of her favorite utilities, including nat, pkg_tree, and gutenbook. Jan. 24, 2002

CVS Administration by Jennifer Vesperman
Jennifer Vesperman explains how to create and manage a CVS repository. Jan. 17, 2002

Automating Network Administration, Part One by Luke A. Kanies
Any task that is carried out by a system administrator more than once is a candidate for being automated. Luke A. Kanies explains how important automation and planning are to a sysadmin. Dec. 20, 2001

System Failure and Recovery Practice by Jeff Dike
Jeff Dike uses User-Mode Linux (UML) to safely emulate system failures and helps us learn how to recover from them. Nov. 29, 2001

Cleaning Up Ports by Michael W. Lucas
Managing third-party applications on your BSD server or desktop can be quite daunting, especially because open-source projects are upgraded frequently. Michael Lucas introduces us to some utilities that can keep this from becoming a nightmare. Nov. 29, 2001

Understanding the Automatons, Part Two by Dru Lavigne
Dru Lavigne discusses the rest of the Periodic scripts. Nov. 21, 2001

Network Scanning by Chris Coleman
Hackers have utilities that allow them to scan a server and discover which ports have daemons listening on them. Chris Coleman reviews tools and other rescources to help you prevent these hackers from gaining control of your computer. Nov. 15, 2001

Stable SMB by Michael W. Lucas
SMB has recently improved to the point where it is reliable enough for use in production settings. Michael Lucas tells you how to use SMB to access a Windows share from your FreeBSD workstation. Nov. 15, 2001

Ethereal and NMap by Richard Forno
This is the first in a series of excerpts from Chapter 7 of Incident Response, covering the nmap port scanner and the Ethereal network scanner. Nov. 15, 2001

Understanding the Automatons by Dru Lavigne
Dru Lavigne explains scripts that are run automatically by your system. Understanding these scripts can be the key to keeping your system tuned and secure. Nov. 8, 2001

Creating Filesystem Backups with 'rsync' by Brian Wilson
Using RAID-1 for drive mirroring doesn't always accomplish what you need. Brian Wilson shares a script for implementing a slow mirror using Perl and rsync. Nov. 1, 2001

Linux System Failure Post-Mortem by Jennifer Vesperman
Diagnosing what went wrong after a system failure can prevent it from happening again. Jennifer Vesperman introduces the tools required for finding out what happened. Nov. 1, 2001

Using the vi Editor by Dru Lavigne
The vi editor is a very powerful, inherent part of Unix. Dru Lavigne teaches us a few useful tricks with it. Oct. 25, 2001

Unix Filesystems by Chris Coleman
If you are new to Unix, the filesystem can be a very difficult thing to grasp. Chris Coleman explains a few of the differences between Unix and Windows filesystems and gets you started in designing your filesystem layout. Oct. 25, 2001

Proper Filesystem Layout by Luke A. Kanies
How you partition your filesystem in Unix can be a very important decision, ultimately affecting the performance of your server. Luke A. Kanies gives some practical advice on where and when to separate your filesystems. Oct. 11, 2001

Accessing a Cisco Router by Dru Lavigne
When you first purchase a Cisco router, you'll need to access the router via its console interface from a serial interface on your computer. Dru Lavigne shows you how to do this from FreeBSD. Oct. 11, 2001

Introduction to PAM by Jennifer Vesperman
Pluggable Authentication Modules provide a solution to the difficulties of user authentication. Jennifer Vesperman introduces PAM and helps you get started. Sep. 27, 2001

Dealing with Full Disks by Michael W. Lucas
Are your hard disks getting full? Michael Lucas helps us track down and recover lost disk space. Sep. 27, 2001

Peering Squid Caches by Jennifer Vesperman
If you are paying for bandwidth by the byte, organizing your Squid servers to work together can save you lots of money. Jennifer Vesperman shows how to configure Squid to work with its peers. Sep. 17, 2001

CVS Mirror by Michael W. Lucas
Running a cvsupd server isn't an easy task, but here's some help to make it simpler. In this edition of Big Scary Daemons, Michael Lucas continues his series on CVSup in Big Scary DaemonsAug. 30, 2001

Multi-Platform Remote Control by Dru Lavigne
Dru Lavigne shows us how to use vnc for administrative remote control of FreeBSD and Windows computers. Aug. 23, 2001

CVSup Infrastructure by Michael W. Lucas
Michael Lucas explains CVSup and the infrastructure required to distribute the FreeBSD source code globally. He also relays information on the use of CVSup from its creator John Polstra. Aug. 16, 2001

Consolidating Servers Under Linux by David HM Spector
David HM Spector explains how to reduce the number of servers that your company has to support and how to bring more services together on the servers that remain.  Aug. 16, 2001

Authentication and Squid by Jennifer Vesperman
Proxy authentication is easy to get wrong because the access control list rules are the inverse of what you would expect. Jennifer Vesperman explains how to authenticate correctly and provides tips for avoiding common mistakes. Aug. 9, 2001

Installing and Configuring Squid by Jennifer Vesperman
Need to reduce bandwidth on your network? Jennifer Vesperman explains how to use Squid, including a list of dos and don'ts to make it run faster. Jul. 26, 2001

Useful Unix Utilities by Dru Lavigne
Dru Lavigne browses the BSD ports collection and introduces several helpful utilities, including several from the "net" and "sysutils" sections. Jul. 19, 2001

Moving to BSD Without Leaving Linux by Chris Coleman
BSD provides impressive support for Linux binary applications. Chris Coleman explains how easy it is to start using BSD without giving up Linux. Jun. 29, 2001

Tools of the Trade: Part 2 by Carl Constantine
In the second part of this ongoing series, Carl Constantine shows you how to use tcpdump and Tripwire to protect your Linux server. Jun. 29, 2001

Controlling User Logins by Michael W. Lucas
Michael Lucas explains how to restrict shell access to a system using as few system resources as possible. Jun. 28, 2001

Tools of the Trade: Part 1 by Carl Constantine
In this first of a three-part series, Carl Constantine covers tools and techniques that system administrators can use to protect their networks, including discussion of nmap, Ethereal, and how to set up honey pots. Jun. 22, 2001

Rotating Log Files by Michael W. Lucas
Log files collect data and grow in size. If you don't tend them, they will fill up all available disk space. Michael Lucas explains how to easily manage log files with newsyslog. Jun. 14, 2001

Dynamic Address Assignment by Terry Dawson
Are you still assigning static IP addresses on your network? Terry Dawson explains how dynamic IP address assignment works and helps you understand if it is right for your network. Jun. 14, 2001

Proper Paranoia: Educating Your Co-Workers by Michael W. Lucas
Michael Lucas runs a new security trainee through the gauntlet of patching live servers. He also shows how to instill a healthy attitude toward network security in those you work with by teaching them to be properly paranoid. Jun. 7, 2001

Getting Connected with 6to4 by Hubert Feyrer
IPv6 is great in theory, but it won't do you much good if you can't get connected. Hubert Feyrer explains the basics of getting connected to IPv6 for BSD and Linux. Jun. 1, 2001

Bulletproofing Servers: Building a Challenge for Murphy by Andy Neely
"Software operates at the whim of hardware, which makes stable hardware important to our longterm happiness as system administrators," writes Andy Neely. To make sure your server hardware is protected from the forces of Murphy, follow his advice for RAID protection, dual power supplies, and redundant Network Interface Cards (NIC). Andy will be a speaker at the upcoming Open Source Convention in San Diego, CA this coming July. Jun. 1, 2001

Testing and Automating PPP by Bill Unruh
Bill Unruh shows us how to test a PPP connection, as well as use tools to automate the connection to dial on demand. May. 24, 2001

System Logging by Michael W. Lucas
Michael Lucas explains how syslog can be used to centralize system logs for a variety of servers. May. 17, 2001

Troubleshooting ISP Connection Problems by Bill Unruh
In this PPP how-to feature, Bill Unruh describes a procedure to help Linux users troubleshoot ISP connection problems. May. 11, 2001

BSD Tricks: CVS by Michael W. Lucas
Most open source projects use CVS to coordinate the efforts of the thousands of volunteer developers. Michael Lucas shows us how to get started using CVS. May. 3, 2001

Initial PPP Setup by Bill Unruh
Setting up PPP on Linux can be frustrating at times. Bill Unruh explains the basics of PPP in part one of an in-depth PPP how-to for Linux May. 3, 2001

The ROCK Linux Philosophy by Clifford Wolf
Clifford Wolf is creating an admin-friendly distribution of Linux. He explains the differences between ROCK Linux and standard, user-friendly distributions of Linux. Apr. 27, 2001

Common PHP Installation Problems by Darrell Brogdon
Darrell Brogden details a few of the common mistakes users make when installing PHP. Apr. 26, 2001

Scanning Your Network by Dru Lavigne
Dru Lavigne shows us how to use nmap, a port scanning utility, to secure Unix servers and workstations. Apr. 18, 2001

Beyond Firewalls by Carl Constantine
Now that you have your firewall up and running, you're all set, right? Well, not exactly. Carl Constantine explains how to plug some of the common security holes beyond the firewall. Mar. 30, 2001

Securing a PHP Installation by Darrell Brogdon
Darrell Brogdon shows us a few basic things that should be done to secure a PHP installation. Mar. 29, 2001

Capturing TCP Packets by Dru Lavigne
Want to capture network packets? Dru Lavigne shows how simple the process is and explains how to analyze the captured data. Mar. 21, 2001

Installing PHP as an Apache DSO by Darrell Brogdon
Darrell Brogdon reviews how to install PHP as a dynamically shared object. This useful trick allows you to upgrade PHP without recompiling Apache. Mar. 15, 2001

TCP Protocol Layers Explained by Dru Lavigne
Dru Lavigne explains how to read IP packet headers. Mar. 14, 2001

Understanding Filesystem Inodes by Dru Lavigne
Dru Lavigne finishes up her explanation of hard drives and Unix filesystems by explaining how inodes fit into the picture. Mar. 7, 2001

Understanding Unix Filesystems by Dru Lavigne
Dru Lavigne explains the basics of Unix filesystems. Feb. 28, 2001

Dividing Your Data by Dru Lavigne
Dru Lavigne walks through the process of setting up partitions in FreeBSD and helps you divide your data into logical storage units.  Feb. 21, 2001

Ximian GNOME: Welcome to Your Desktop by Daniel Solin
Daniel Solin follows up his GNOME installation article and shows us how to configure the Ximian GNOME desktop. Feb. 16, 2001

Creating Network Diagrams by Terry Dawson
As the complexity of your network grows, it makes good sense to maintain documentation that describes it. Terry Dawson reviews tools to make this easier. Feb. 15, 2001

Monitoring Unix Logins by Dru Lavigne
Dru Lavigne exposes the contents of wtmp, utmp, and lastlog, the files that record who is logged in to your Unix system. Feb. 14, 2001

Linux Kernel Problems; SSH Design Flaw by Noel Davis
Noel Davis shows us a system-call problem and a race condition in Linux; buffer-overflow problems in SSH-1 and XMail; DOS attack vulnerabilities in BIND 9.0.1 and ProFTPD; string format problems in man; design flaws in wireless networking security code; and temporary file problems in FreeBSD's sort. Feb. 13, 2001

Buffer-Overflow Problems in BIND by Noel Davis
Buffer-overflow bugs are discovered in BIND, gnuserv, tinyProxy, and INN; developers report issues with ntop and LPRng. Feb. 6, 2001

Ramen Worm Attacks Red Hat Linux Machines by Noel Davis
An Internet worm that attacks Red Hat Linux machines has cracked hundreds of machines. Noel Davis describes this and other security problems brought to light this week.  Jan. 22, 2001

Establishing Good Password Policies by Dru Lavigne
Everyone knows secure passwords are important, but what makes a password secure? Dru Lavigne gives us some tips on creating secure passwords, and shows how to implement a password policy that requires users to create passwords securely. Jan. 17, 2001

Insecure Temporary File Functions by Noel Davis
Noel Davis reports on the latest security problems and news, including the Immunix OS security audit, issues with GNU C library, ReiserFS, linuxconf and more. Jan. 15, 2001

The PHP Configuration File by Darrell Brogdon
Darrell Brogdon explains how the php.ini file works. Jan. 11, 2001

Adding a User to FreeBSD -- Part Two by Dru Lavigne
Dru Lavigne explains what really goes on when a user gets added to the system, including all the copied and modified files. Jan. 10, 2001

IBM Websphere, Shockwave Flash, and emacs Advisories by Noel Davis
Problems this week include minor problems with sendmail, exposure problems with Lotus Domino, problems in the default setup of Informix Webdriver and IBM Websphere Commerce Suite, a buffer overflow in Shockwave Flash, denial of service attacks against login, privacy problems in emacs, symlink attack in exmh, and a potential exploit against GTK+.  Jan. 8, 2001

Fine Control of Ports by Michael W. Lucas
Michael Lucas continues his developer's tour through the ports system and explains how to set the more common variables. Jan. 4, 2001

Adding Users to FreeBSD by Dru Lavigne
Adding users to your Unix system is one of the most important things you can do after the initial setup. Dru Lavigne takes us through the steps of adding a user to a FreeBSD machine. Jan. 3, 2001

PalmOS, Half-Life Server, and Ethereal Vulnerabilities by Noel Davis
Problems this week include more symlink problems with catman and dialog, buffer overflows in oops, halflifeserver, and ethereal, key problems with gnupg, problems with PalmOS devices, and a prime example of amazing vulnerabilities in third-party software packages.  Jan. 2, 2001

BSD Ports Collection Basics by Michael W. Lucas
Michael Lucas takes us on a developers tour through the BSD ports collection. He introduces how the ports collection works and identifies some of its key components. Dec. 21, 2000

A Look Through the Ports Collection by Dru Lavigne
Dru Lavigne looks through the ports collection for interesting and obscure applications. Dec. 20, 2000

Security Alerts: SAMBA, pine, ircd, and More by Noel Davis
Noel Davis summarizes recent open source and Unix security-related advisories. Problems this week include symlink problems with joe, pico, and samba, a buffer overflow in bftpd, and problems with pine. Dec. 19, 2000

Installing PHP on a Windows System by Darrell Brogdon
Darrell Brogdon explains the steps required to install PHP on a Windows system. Dec. 14, 2000

Accessing MS-DOS Filesystems by Dru Lavigne
Dru Lavigne shows us how to access MS-DOS filesystems from BSD using the programs mtools and mfm. Dec. 13, 2000

Security Alerts: KTH Kerberos, Red Hat PAM, and More by Noel Davis
Noel Davis summarizes open source and Unix exploits. Problems this week include local and remote root exploits in KTH Kerberos, buffer overflows in Red Hat's PAM, a discussion of security problems with web-based applications, and an example of one of these security problems in phpGroupWare.  Dec. 12, 2000

BSD Tricks: Unprepared Disaster Recovery by Michael W. Lucas
Michael Lucas takes us through every network administrator's nightmare -- a server crash. He documents an actual crash and tells what he did to get things back online. Dec. 7, 2000

Security Alerts: Twig, Midnight Commander, and More by Noel Davis
Noel Davis summarizes published open source and Unix exploits. Problems this week include arbitrary code execution in Twig, new symlink attacks, a hidden control code attack on Midnight Commander, and a LANGUAGE attack on glibc. Dec. 6, 2000

Small Office Linux by Michael J. Norton
People from all walks of life are becoming Linux system administrators for small enterprises. If that's the case for you, here's a valuable guide to get you started on the right foot. Dec. 1, 2000

The System Startup Daemon: init by Dru Lavigne
Dru Lavigne steps us through the boot process on a BSD system and explains the init daemon. Nov. 29, 2000

Basic Installation of PHP on a Unix System by Darrell Brogdon
Need a powerful replacement for ASP web scripting? Darrell Brogden walks us through compiling and installing PHP, an open source web scripting language that you can embed into HTML. Nov. 17, 2000

An Introduction to Webmin -- Part Two by Dru Lavigne
Dru Lavigne continues her tutorial on using webmin and takes us step by step through the administration screens. Nov. 1, 2000

An Introduction to Webmin by Dru Lavigne
In the first of a two-part series, Dru Lavigne introduces the Webmin server. Learn how to configure and view information about your FreeBSD computer, all through a web browser. Oct. 25, 2000

BSD Tricks: Introductory Revision Control by Michael W. Lucas
Use built-in revision control to track changes made to files and control editing by multiple users. Oct. 19, 2000

Getting Cron to Do Our Bidding by Dru Lavigne
Wouldn't it be great if you could get your Unix system to perform commands automatically and then e-mail you the results? Dru explains how cron works and shows us how to read crontabs. Sep. 27, 2000

Long-Term Monitoring with SNMP by Michael W. Lucas
Michael Lucas shows us how to use mrtg to turn long-term SNMP statistics into easy-to-read web pages. It will even chart bar graphs. Sep. 21, 2000

BSD Tricks: MFS by Michael W. Lucas
MFS lets you use system memory like a hard drive. Michael Lucas explains how to use it wisely. Sep. 7, 2000

NISTNet: Emulating Networks on Your Own LAN by Terry Dawson
Use NISTNet to create realistic network traffic on a local LAN. Stress test your applications before they reach the real world. Jun. 22, 2000

The Week in Linux News by Baiju Thakkar
Exploring RAID technology, reviews of Red Hat 6.2 preview release, Enlightenment, startx, KDE icons, and shell loop constructs. Apr. 20, 2000

The Week in Linux News by Baiju Thakkar
How to build a firewall, tutorials on vi and Bash, Sun's hesitation on Linux, and new releases.  Apr. 4, 2000

The Week in Linux News by Baiju Thakkar
New tutorials and reports on security, PHP, Apache and Perl.  Mar. 22, 2000

Installing mod_perl from RPM by Stephen Figgins
It's easy to install mod_perl using the Red Hat package manager. Configuring it is trickier. Mar. 17, 2000

The Week in Linux News by Baiju Thakkar
Network and security resources, new releases, and developer resources. Mar. 15, 2000

Deploying Squid, Part 2 of 2 by Jeff Dean
Install your own web proxy. Mar. 10, 2000

Preventing Distributed Denial of Service Attacks by Terry Dawson
Six ways to avoid becoming an unwilling collaborator.  Mar. 9, 2000

Linux Tools For Network Analysis by David HM Spector
Spector finds two tools for watching traffic: Ethereal and Netwatch. Mar. 3, 2000

Using Standard Input and Output by Mike Loukides
A quick review of basic redirection techniques used by every Unix guru. Feb. 24, 2000

Checking Differences with diff by Dale Dougherty
Quickly examine differences between similar files. Feb. 24, 2000

Comparing Three Different Versions with diff3 by Dale Dougherty
Got three similar files to compare? Use diff3! Feb. 24, 2000

Context diffs by Jerry Peek
Context diffs show the lines around changes in similar files.  Feb. 24, 2000

ex Scripts Built by diff by Tim O'Reilly
diff can build automatic editing scripts you can use to change multiple files or to store a revision history. Feb. 24, 2000

Looking for Closure by Tim O'Reilly
A gawk script that can be used to make sure items that need to occur in pairs actually do so. Feb. 24, 2000

Change Many Files by Editing Just One by Jerry Peek
Use ed and diff to edit mulitple files. Feb. 24, 2000

patch: Generalized Updating of Files that Differ by Tim O'Reilly
There's an easy way to make changes based on diffs, use Larry Wall's patch utility. Feb. 24, 2000

Interview: Mendel Rosenblum of VMware by David Sims
VMWare's Chief Scientist explains the virtual machine that runs multiple operating systems on your desktop. Feb. 18, 2000

Sponsored by: