Old Articles: <Older 51-60 Newer> |
|
Salon.com November 17, 2000 Jordan Hubbard |
Open-sourcing the Apple A hacker reviews the beta release of the BSD-based Mac OS X -- and dreams of toppling Microsoft... |
Unix Insider November 2000 Jim Mauro |
The lightweight process pool A system must maintain enough LWPs available for runnable user threads while keeping the pool small enough so that it doesn't waste kernel resources. How can this be done? Jim Mauro examines the mechanics of the LWP resource pool reserved for unbound user threads... |
Unix Insider October 2000 Peter Baer Galvin |
Decrease your stress Much of a systems administrator's stress comes from unexpected downtime and dissatisfied users. This month in Pete's Super Systems, Pete introduces two free tools that will help reduce the chances of both. He also shares reader email... |
Unix Insider October 2000 Mo Budlong |
Security basics, Part 1 How to set basic file and directory permissions... |
Linux Journal Daniel Lazenby |
SAMBA Black Book by Dominic Baines SAMBA Black Book is about providing server message blocks (SMB) networking services in a mixed operating system network. This 13-chapter book offers the reader foundational information, advanced topics and explores administrative issues... |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
Unix Insider October 2000 Jim Mauro |
Scheduling in the user threads library, Part 2 How to make use of the scheduling policies available in POSIX threads... |
RootPrompt.org October 9, 2000 |
Sniping at OpenBSD Last week several vulnerabilities with OpenBSD were announced on the full disclosure list Bugtraq. That a hole was found and exploited is not an amazing thing. The amazing and impressive thing is how long OpenBSD had gone without a local root exploit... |
Unix Insider September 2000 Peter Baer Galvin |
Why aren't you logging? This month Pete discusses a new, must-use feature included in Solaris 7 and 8, and recommends two helpful articles from Sunsolve. |
Unix Insider September 2000 Mo Budlong |
Traveling down the Unix $PATH Why do some commands need a dot-slash in order to run? In this month's Unix 101 column, Mo Budlong explores the answer to this question, and explains the difference between built-in and executable commands. |
<Older 51-60 Newer> Return to current articles. |