Many that play PC games, such as battle.net, need to be able to set up port triggering. Typical "hardware" routers have the ability to set this up from online menus. However, using a Linux PC to perform your router functions can provide much more control and versatility than can be realized with a "hardware" router.
Read more »Port Triggering Using A NAT Firestarter Firewall And Specter In Debian/Ubuntu
Firebird Roadmap 2009
The major Firebird version currently in development is v.2.5. Its feature set is being finalized at the moment in preparation for entering the Beta stage of development. The start of the Beta cycle will be accompanied by a "feature freeze" rule.
Read more »- Login to post comments
Crystal desktop search applet.
Over new year, I've been playing around with Strigi and Nepomuk, which are the two technologies around desktop search and "making sense of your data". Strigi is the underlying library that is used to analyze all sorts of files and index those results. Nepomuk provides a semantic layer on top of this information, and a nice KDE API for easy integration in applications.
Read more »Installing And Configuring OpenLDAP On Ubuntu Intrepid Ibex
With Ubuntu 8.10 Intrepid Ibex, the way OpenLDAP is used and configured has changed. In Intrepid, OpenLDAP is no longer configured via the slapd.conf file, but via the slapd.d directory that contains ldif files to configure OpenLDAP.
Read more »- Login to post comments
using flock to protect critical sections in shell scripts
This isn't about a shell script, it's about a really cool technique to apply in shell scripts. Have you ever been worried about multiple instances of a shell script running because they might overwrite or corrupt the data or devices they are working on? Here's a way to prevent that.
Read more »- Login to post comments
Hardening the Linux server
Servers—whether used for testing or production—are primary targets for attackers. By taking the proper steps, you can turn a vulnerable box into a hardened server and help thwart outside attackers. Learn how to secure SSH sessions, configure firewall rules, and set up intrusion detection to alert you to any possible attacks on your GNU/Linux® server.
Read more »Apache + mod_proxy + mod_ssl - A good, secure reverse proxy
Having several offices in the company and one of our policy being to allow people to work from home, a lot of our services are available as web services. As we make heavy usage of virtualization, these websites are spread on many different virtual machines, depending on their requirements (PHP, Java, Python, Mysql, Postgresql...).
Read more »Red Hat to host virtual JBoss show
Red Hat is following the Second Life path and is set to host an online conference for users and partners of its JBoss Java-based middleware products.
Read more »- Login to post comments
dstat: versatile tool for generating system resource statistics
During my work with computers, I like to check the usage of system resources in my network. Sometimes a running process takes up too much CPU load, or the disk I/O goes too high. To get a clean picture of how much resources are being used by a client, I used ifstat, top(1) and iostat(1). Since I have found out about dstat, I can cleanly check out all the system resources used by my computers.
Read more »Solaris Distro Review - OpenSolaris 2008.11
The free software world is in great evolution, and among the new projects and new versions of old projects, there is always something new that appears on the horizon. OpenSolaris is one of them news, even if it is not really a news. The Solaris operating system, from Sun Microsystems is not new, indeed, but the project was on its bases, and i'm honoured to write a review.
Read more »Linux 2.6.28's five best features
While you were likely to be opening up Christmas presents, Linus Torvalds was giving Linux users around the world a special present: the release of the next major Linux kernel: Linux 2.6.28.
Read more »- Login to post comments
Moonlight got easier for Ubuntu users
Last month I mentioned that version 1 of Moonlight, the open source port of Microsoft’s Silverlight software, reached both beta status and finally it’s official release (download the Firefox plugin here). Of course I still had one problem. Since I moved from Firefox 3 to Epiphany I couldn’t use the plugin for Firefox.
Read more »- Login to post comments
Flip, size, rotate, and more [from the command line] with ImageMagick
There's nothing quite like command-line tools for handling large batches of tasks, and image manipulations are no exception. Web developers and administrators will appreciate the ability to handle large numbers of files easily, either at the command line or in scripts.
Read more »Useful command-line secrets for increasing productivity in the office
Using UNIX® in a day-to-day office setting doesn't have to be clumsy. Learn some of the many ways, both simple and complex, to use the power of the UNIX shell and available system tools to greatly increase your productivity in the office.
Read more »- Login to post comments
War of the text editors
In 1976 one man changed the face of text editors. That man is Bill Joy who developed vi for BSD UNIX. To those who are a bit unfamiliar with command line UNIX/Linux, vi (short for Visual) is a screen-oriented text editor that operates in two modes: insert mode and normal mode. Please reference here for a deeper explanation of its design and implementation.
Read more »- Login to post comments






