oreilly.comSafari Books Online.Conferences.

advertisement Articles

251 to 300 of 305 Prev Next

The Perl Camel FAQ
The Perl Camel FAQ 05/15/2002

The Perl Camel Usage and Trademark Information
The Perl Camel Usage and Trademark Information 05/15/2002

Managing Images With a Web Database Application by Hugh E. Williams
Learn how to create a Web application to upload, store, and retrieve image files using PHP and MySQL. 05/09/2002

Developing the Emulator BNETD by Howard Wen
Learn about the technical and legal challenges of the open source BNETD project. 05/09/2002

Optimizing Disk Subsystems for Random I/O by Gian-Paolo D. Musumeci
This case study in optimizing disk subsystems shows how to write a program to simulate workload and select an appropriate disk array technology. 05/02/2002

SSH Port Forwarding by Daniel J. Barrett and Richard E. Silverman
Port forwarding is another method of allowing SSH through a firewall. This excerpt also touches on some security concerns and SSH authentication. Excerpted from Chapter 11 of SSH, The Secure Shell: The Definitive Guide. 04/25/2002

Apache and SSL by Paul Weinstein
Learn how SSL establishes a secure HTTP connection, uses ciphers and digital certificates to encrypt and authenticate two parties, and how to integrate it into Apache. 04/18/2002

Network Management With OpenNMS by Shane O'Donnell
OpenNMS is taking a crack at replacing commercial network management tools such as HP Open View and IBM Tivoli. 04/18/2002

Using SCP Through a Gateway by Daniel J. Barrett and Richard E. Silverman
Using SCP though a gateway requires a bit more configuration than SSH. 04/11/2002

SSH Case Studies: Connecting Through a Gateway Host by Daniel J. Barrett and Richard E. Silverman
A firewall can easily hinder your secure shell access to the rest of the world. Fortunately, SSH configuration is flexible enough to afford a neat solution . 03/28/2002

Application I/O Pattern Analysis by Gian-Paolo D. Musumeci
This case study in performance analysis shows how a little Perl can help identify I/O patterns. 03/28/2002

The Top 10 SANs vs. NAS Decision Factors by W. Curtis Preston
Learn about the differences between Storage Area Networks (SANs) and Networked Attached Storage (NAS) in this article by W. Curtis Preston, the author of Using SANs and NAS. 03/14/2002

How Will History View Richard Stallman? by Bruce Stewart
We spoke to Sam Williams, the author of Free as in Freedom, about how history will view Richard Stallman and the Free Software Foundation. 02/28/2002

Improving Compilation Times: A Case Study in Performance Analysis by Gian-Paolo D. Musumeci
This hypothetical case study plans a tuning strategy for reducing compilation times, based on the system's workload and the potential bottlenecks associated with memory consumption, CPU usage, and disk I/O. 02/21/2002

An SVG Histogram by J. David Eisenberg
Learn how to generate an SVG graphic from existing data, using a Perl program that draws a graph of the distribution of file sizes in a directory. 02/07/2002

Making the PostgreSQL and PHP Connection by Joshua D. Drake
Most people who use PHP with open source databases use PHP with MySQL. As an invitation to using PostgreSQL, this article by Practical PostgreSQL coauthor Joshua Drake shows the fundamentals of using PHP with PostgreSQL. 01/24/2002

Slash's Wiki Plugin by chromatic
The latest stable version of Slash comes with several interesting plugins, and most future Slash development will probably involve creating new plugins. In this article, Slashdot's chromatic introduces Wikis and gives a detailed explanation of how and why the Wiki plugin works. chromatic is coauthor of O'Reilly's upcoming Running Weblogs with Slash. 01/17/2002

Design Patterns in Qt by Matthias Kalle Dalheimer
Matthias Kalle Dalheimer, author of O'Reilly's upcoming Programming with Qt, 2nd Edition, explores how Design Patterns are used in Qt programming. 01/10/2002

Six Things a SysAdmin Should Know About XP by Andy Patrizio
Regardless of your preferred platform, as a sysadmin you're likely to begin to see XP machines entering your network (if they haven't already). Here are six things to help you deal with them. 01/10/2002

Automating Network Administration, Part Two by Luke A. Kanies
An automated network requires planning and consistency. Luke A. Kanies shows us how to automate server installations to achieve consistency from the beginning. 01/03/2002

Snort 'n Dragon by Richard Forno and Kenneth R. van Wyk
Snort and Dragon are two intrusion-detection programs that allow you to detect hackers trying to break into your system. This is the third in a series of excerpts from Chapter 7 of Incident Response. 12/20/2001

Automating Network Administration, Part One by Luke A. Kanies
Any task that is carried out by a system administrator more than once is a candidate for being automated. Luke A. Kanies explains how important automation and planning are to a sysadmin. 12/20/2001

Tripwire by Richard Forno, Kenneth R. van Wyk
When a hacker gets through your primary defences, its hard to tell what they may have done to your system. Tripwire can reliably detect changes to your system, including rootkits. This is the second in a series of excerpts from Chapter 7 of Incident Response. 12/13/2001

NuSphere's IDE for PHP Programmers by Jay Greenspan
NuSphere's PHPEd is an Integrated Development Environment for PHP programmers that features a text editor, code debugger, and time-saving wizards for creating HTML and JavaScript. Jay Greenspan takes a look at its benefits for scripters. 11/28/2001

Ethereal and NMap by Richard Forno and Kenneth R. van Wyk
This is the first in a series of excerpts from Chapter 7 of Incident Response, covering the nmap port scanner and the Ethereal network scanner. 11/15/2001

Network Scanning by Chris Coleman
Hackers have utilities that allow them to scan a server and discover which ports have daemons listening on them. Chris Coleman reviews tools and other rescources to help you prevent these hackers from gaining control of your computer. 11/15/2001

Unix Filesystems by Chris Coleman
If you are new to Unix, the filesystem can be a very difficult thing to grasp. Chris Coleman explains a few of the differences between Unix and Windows filesystems and gets you started in designing your filesystem layout. 10/25/2001

Firing up Firewalls by Chris Coleman
A firewall is an important weapon in your defense against hackers. Chris Coleman helps you get started with all the tools needed to install a firewall. 10/19/2001

An Introduction to LDAP by Luke A. Kanies
Luke A. Kanies introduces LDAP and explains why it is an important tool for network administrators. 08/16/2001

Linux Compatibility on BSD for the PPC Platform: Part 5 by Emmanuel Dreyfus
In part five of his series on porting the Linux compatibility layer to NetBSD's PPC platform, Emmanuel Dreyfus looks at Linux emulation fixes needed to have a fully functional Linux gdb. 08/09/2001

IPFilter on OpenBSD by Mike DeGraw-Bertsch
IPFilter is a firewall widely used by BSD and Solaris. Mike DeGraw-Bertsch explains how to set it up on OpenBSD and explains a basic ruleset. 08/02/2001

Controlling Bandwidth by Michael W. Lucas
How do you control someone's incoming bandwidth? Michael Lucas details his adventures regulating bandwidth to a virtual host. 07/26/2001

Professional Paranoia: Secrets of Security Experts by Michael W. Lucas
Michael Lucas tackles the question "How do I become a security professional?" and gives practical advice on how to be more security-conscious. 07/12/2001

The Evolution of SOAP::LITE by Pavel Kulchenko
SOAP functionality is growing in leaps and bounds. Paul Kulchenko, a speaker at the upcoming O'Reilly Open Source Convention, talks about his experiences in the early days of SOAP and the directions he sees it going. 06/29/2001

Linux Compatibility on BSD for the PPC Platform: Part 4 by Emmanuel Dreyfus
Emmanuel Dreyfus explains difficulties discovered in porting the Linux compatibility layer to run the Java Virtual Machine. 06/21/2001

Business Opportunities for PHP in the Wireless Market by Roland Schmidt
Even though it's not widely considered as such, PHP is a great tool for developing wireless applications, and it could be an entry point for open-source developers to break into the lucrative wireless market. 06/15/2001

Proper Paranoia: Educating Your Co-Workers by Michael W. Lucas
Michael Lucas runs a new security trainee through the gauntlet of patching live servers. He also shows how to instill a healthy attitude toward network security in those you work with by teaching them to be properly paranoid. 06/07/2001

Linux Compatibility on BSD for the PPC Platform: Part 3 by Emmanuel Dreyfus
Signals are the interactions between the kernel and the user program -- a program can't run without them. Emmanuel Dreyfus explains how to make your signals Linux-compatible. 06/07/2001

Getting Connected with 6to4 by Hubert Feyrer
IPv6 is great in theory, but it won't do you much good if you can't get connected. Hubert Feyrer explains the basics of getting connected to IPv6 for BSD and Linux. 06/01/2001

PostgreSQL's Multi-Version Concurrency Control by Joseph Mitchell
Multi-Version Concurrency Control (MVCC) in PostgreSQL helps avoid the frustration that "locks" can cause by making users wait while working in a multi-user database environment. In this article, GreatBridge engineer Joseph Mitchell explains how MVCC works. 05/25/2001

Introduction to IPv6 by Hubert Feyrer
You have been told the Internet is running out of IP addresses and all your friends say NAT is the answer, but what is IPv6 and how is it different from what you are using now? 05/24/2001

Perl Program Repair Shop and Red Flags by Mark-Jason Dominus
Beginning writers often will write ten words where five will do. Beginning programmers are the same. In this article, Mark-Jason Dominus takes actual Perl code and shows how to make it more efficient. 05/18/2001

Linux Compatibility on BSD for the PPC Platform: Part 2 by Emmanuel Dreyfus
Emmanuel Dreyfus takes a look at how to prevent dynamic Linux binary compatibility problems on the NetBSD/PowerPC platform. 05/17/2001

Linux Compatibility on BSD for the PPC Platform by Emmanuel Dreyfus
The Linux compatibility layer allows BSD to run Linux binary applications. Emmanuel Dreyfus explains how he implemented this on NetBSD for the PowerPC. 05/10/2001

TTYs and X Window: Unix Now and Then by Hubert Feyrer
Hubert Feyrer discusses the history of Unix terminal emulation and compares the X Window System to traditional terminal-based I/O. 03/22/2001

PHP and the Sablotron Processor by W.J. Gilmore
W.J. Gilmore introduces the Sablotron processor and uses it to build a PHP-powered news application that uses XSLT to display content in a variety of formats. 03/16/2001

Is Open Source Un-American? by Tim O'Reilly
Tim O'Reilly's shuttle diplomacy between Microsoft's Jim Allchin and the Free Software Foundation's Richard Stallman drew heated responses -- and accusations. Tim responds to reader email, and renews his call to choose the right license for the needs of your software development project. 03/08/2001

IPv6: An Interview with Itojun by Hubert Feyrer
Hubert Feyrer interviews Jun-ichiro "itojun" Hagino, one of the core IPv6 developers involved with the KAME project. 03/02/2001

Where Have All the IPs Gone? by Michael W. Lucas
There are over 4 billion IP addresses available, and yet, we are still running out. Michael Lucas explains where they went and how people are working to solve the problem. 03/02/2001

An Interview With Illiad by Chris Coleman
User Friendly creator, Illiad, talks about the roots of his famous comic strip and how he managed to succeed after numerous syndication rejections. 02/09/2001

251 to 300 of 305 Prev Next

Sponsored by: