0

Kernel space: The Tru64 Advanced Filesystem

http://www.linuxworld.com

HP has released Digital's Tru64 Advanced Filesystem under the GPL, free for Linux developers to borrow. And developers can learn a lot from this museum piece.

Read more »
lozz's picture
Created by lozz 17 years 27 weeks ago
Category: High End   Tags:
0

Industry's Leading GNU-based Toolchain Available Now, Optimized for MIPS(R) Cores

http://www.kvoa.com

MIPS Technologies, Inc. , a leading provider of industry-standard architectures, processors and analog IP for digital consumer, home networking, wireless, communications and business applications, today announced that a MIPS(R)-optimized release of Sourcery G++, a complete C/C++ development environment based on the GNU Toolchain and the Eclipse(TM) IDE, is available now from CodeSourcery, Inc.

Read more »
missgeek's picture
Created by missgeek 17 years 27 weeks ago
Category: High End   Tags:
0

[rails-on-emacs] emacs-rails forked

http://groups.google.com

"I have decided to fully rewrite rails-emacs because this project began as a small set of functions, expanding it is more and more and more. The code became very confused, addition of new opportunities and
correction of bugs has turned to a headache..."

Read more »
can.axis's picture
Created by can.axis 17 years 28 weeks ago
Category: High End   Tags:
0

One live DVD, one ton of Linux games

http://www.linux.com

LinuX-Gamers Live is a live DVD from Germany based on Arch Linux that includes nothing but games. Version 0.9.3 was released in June and provides an excellent means of sampling Linux games or setting up a home arcade, although a few of the games wouldn't run on my machine.

Read more »
kitin's picture
Created by kitin 17 years 28 weeks ago
Category: High End   Tags:
0

How To Prevent Brute Force Attacks

http://suresh-mobileweb.blogspot.com

A brute force attack is an attempt to log into a secure system by making lots of attempts in the hopes of eventual success. It’s not a sophisticated type of attack, hence the name "brute force." For example, if you have a login process that requires a username and password, there is a limit as to the possible number of username/password combinations.

Read more »
suresh_nsnguys's picture
Created by suresh_nsnguys 17 years 28 weeks ago
Category: High End   Tags:
0

How To Block Cookies From Unwanted Websites With SafeSquid Proxy Server

http://www.howtoforge.com

SafeSquid's Cookie Filter Section, allows you to control exchange of cookies between users and websites. You can define what websites are allowed / denied to exchange cookies with users, either to enhance security, or to disable the users from logging into their personal accounts.

Read more »
serdar's picture
Created by serdar 17 years 28 weeks ago
Category: High End   Tags:
0

Investigating strange dialup activity with Wireshark

http://www.linux.com

A controlled dial-on-demand router is a convenient tool. An uncontrolled dial-on-demand router is not. The Wireshark network protocol analyzer helped me track down the cause of some strange and unwanted dialup connections.

Read more »
LittleBabyCheeses's picture
Created by LittleBabyCheeses 17 years 28 weeks ago
Category: High End   Tags:
0

10 Best Hacking and Security Software Tools for Linux

http://www.junauza.com

Linux is a hacker’s dream computer operating system. It supports tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions.

Read more »
Anonymous's picture
Created by Anonymous 17 years 28 weeks ago
Category: High End   Tags:
0

Dealing With ZFS-Rooted Zones on Solaris 10 Unix

http://linuxshellaccount.blogspot.com

How to attempt to work around the fact that Solaris 10 zones, living on zfs rooted filesystems, can't be handled properly by Sun's Solaris 10 upgrade!

Read more »
eggixyz's picture
Created by eggixyz 17 years 28 weeks ago
Category: High End   Tags:
0

Using Bonnie++ for filesystem performance benchmarking

http://www.linux.com

Bonnie++ allows you to benchmark how your filesystems perform various tasks, which makes it a valuable tool when you are making changes to how your RAID is set up, how your filesystems are created, or how your network filesystems perform.

Read more »
alienhub's picture
Created by alienhub 17 years 28 weeks ago
Category: High End   Tags:
0

Audio/Visual Synthesis For Linux: The New Art, Part 1

http://www.linuxjournal.com

The Linux Journal recently published an article I wrote on Jean-Pierre Lemoine's AVSynthesis, a program designed for artists working with the computer as a medium for the synthesis of image and sound. I'm fascinated by that program, so I decided to research the existence of similar software. This article presents the current findings from that research.

Read more »
bluecheese's picture
Created by bluecheese 17 years 28 weeks ago
Category: High End   Tags:
0

Create Your Own Web Server With BIND And Apache On CentOS 5 (Simplified)

http://www.howtoforge.com

This tutorial explains how you can run your own web server on CentOS 5 with the help of Apache and the BIND name server.

Read more »
serdar's picture
Created by serdar 17 years 28 weeks ago
Category: High End   Tags:
0

KDE: It’s time for a fork . . . is it really?

http://www.cookingwithlinux.com

Over at Practical Tech Steven J. Vaughan-Nichols suggests that it may be time for a fork of KDE, mostly because he doesn't believe that KDE 4.1 is heading in the right direction.

Read more »
anna's picture
Created by anna 17 years 28 weeks ago
Category: High End   Tags:
0

Class Browser plugin for Gedit

http://phorolinux.com

This is a awesome Class Browser plugin for Gedit. It supports many languages, includes: C, C++, Java, Perl, PHP, Ruby, Python, HTML, XML, JavaScript, Tcl etc.

Read more »
missgeek's picture
Created by missgeek 17 years 28 weeks ago
Category: High End   Tags:
0

cpipe - Determine the throughput of a pipe command

http://www.ubuntugeek.com

If you want to Determine the throughput of a pipe you need to use cpipe.Cpipe copies its standard input to its standard output while measuring the time it takes to read an input buffer and write an output buffer. Statistics of average throughput and the total amount of bytes copied are printed to the standard error output.

Read more »
mmclarkson's picture
Created by mmclarkson 17 years 28 weeks ago
Category: High End   Tags:

Best karma users