Security
Networking Security Concepts
Published by fredrik
Friday, August 06, 2004
The key to network security can be found in understanding the choices and strategies available to you look to the building blocks of network security. These include implementing user authentication, using proxy servers and firewalls, setting up demilitarized zones, and taking advantage of port- and packet-filtering technologies. The overview of these security solutions provided by this article will give you an understanding of the technology. User authentication, the first option discussed in this article, is the most basic component of network security, and its success depends on the method used (encrypted, plain text, and so forth), and on the ability to keep this information from unauthorized personnel. Read more...

comment, print this article



Linux
Fedora Linux Core II Review
Published by fredrik
Friday, August 06, 2004
We put Fedora through rigorous tests in a production environment. We installed it on three systems using two strictly as desktops and one as a workstation and server. The workload included producing commercial documentation, remote administration of six high traffic servers, a sales and secretarial desk. This allowed us to see how Fedora would perform over several days in the real world. Read more...

comment, print this article



Linux
SuSE Linux Enterprise Server 9
Published by fredrik
Thursday, August 05, 2004
SuSE Linux Enterprise Server 9 was released yesterday. Evaluation versions of SuSE Linux Enterprise Server 9 for x86, AMD64 and Intel EM64T are available as free downloads from novell.com.

comment, print this article



Linux
Mandrakelinux 10.1 beta 1
Published by fredrik
Thursday, August 05, 2004
Mandrakelinux 10.1 beta 1 has been synchronizing to mirrors and includes many new packages. There is also a Mandrakelinux 10.1 beta 1 screenshot slideshow. Read more...

comment, print this article



Security
Introduction to SuSEfirewall2
Published by fredrik
Thursday, August 05, 2004
SuSEfirewall2 divides the network world into three zones: external (EXT), DeMilitarized Zone (DMZ), and internal (INT). The external zone is where the untrusted hosts are (e.g., the Internet). The DMZ is where your publicly accessible servers are (e.g., a Web site or a server for incoming email). The DMZ is accessible from the external zone and possibly from the internal zone. The internal zone is where the hosts protected by the firewall are. Each network interface (e.g., eth0, wlan0) is in one of the three zones.Read more...

comment, print this article



Apps
Firefox, Thunderbird, Mozilla Suite Upgrades Released
Published by fredrik
Thursday, August 05, 2004
mozilla.org today released minor upgrades to three of its major products. Firefox 0.9.3, Thunderbird 0.7.3 and Mozilla 1.7.2 are all now available. These three new releases were created to correct 4 possible security vulnerabilities in past versions of each product. Read more...

comment, print this article



Apps
GnomeFiles Achieves 1.0, Officially
Published by fredrik
Thursday, August 05, 2004
One and a half months after its original beta launch, GnomeFiles, our GTK+ software repository, is now proclaimed v1.0. There are a few things still to do on the Developer's section (e.g. let devs upload application icons directly to our server), but the user's front-end is now feature complete. Read more...

comment, print this article



Linux
Spin up a Linux LiveCD
Published by fredrik
Thursday, August 05, 2004
Many Linux® distributions have been designed as so-called "LiveCDs," CDs that can be booted directly into working Linux systems. In contrast to "rescue mode" bootable options available with most widely used distributions, these LiveCDs are designed to provide a full set of working tools when booted from CD. Some are general-purpose, some highly specialized. This article takes a look at this fast-growing segment of the Linux market. Read more...

comment, print this article



Security
Securing Web services: PKI basics
Published by fredrik
Wednesday, August 04, 2004
While cryptography alone does not a secure system make, it's important for developers to have a firm grasp of the basic theory and technologies behind encryption, so they can make informed decisions about whether to apply cryptographic technology, and if so, how? Read more...

comment, print this article



Apps
Will iTunes sing on Linux?
Published by fredrik
Wednesday, August 04, 2004
CodeWeavers, which specializes in software that lets Windows programs run on Linux, said on Monday that it has a new version of its software that adds support for Apple Computer's iTunes. The company said CrossOver Office 3.1 adds support for the jukebox and music download software. The version is currently in preview form and is being made available only to existing CrossOver Office customers. Read more...

comment, print this article