This how-to refers to the installation and configuration of Clamav 0.93.3 (from sources) on a Linux server running CentOS 5.2 and sendmail.HowTo...
Blogged with Flock
"It's two weeks (and one day), and the merge window is over," began Linus Torvalds, announcing the 2.6.27-rc1 kernel.2.6.27-rc1, "Pretty Dang Busy" | KernelTrap
Blogged with Flock
The Advanced Compiler Technology group studied programming language implementation and design.Read more...
Blogged with Flock
Midori's lowest level consists of a hardware-native kernel. A second, managed-code kernel, provides operating system functions. ...
Read more...
Blogged with Flock
Further Foxconn fun from Matthew Garrett explains the situation in detail. No intentional breakage of Linux here.Read more...
Blogged with Flock
Everything Windows Driver Development, Excellent articles, latest updates a TOC for every day driver development and a good site for beginners.Go to OSR Online...
We've known it for a long time: the web is big. The first Google index in 1998 already had 26 million pages, and by 2000 the Google index reached the one billion mark.Recently, even google search engineers stopped in awe about just how big the web is these days -- when google systems that process links on the web to find new content hit a milestone: 1 trillion (as in 1,000,000,000,000) unique URLs on the web at once!Read more...
The Little Implementation Language LIL offers a number of features that facilitate writing structured, high-level code with no sacrifice in efficiency over assembly language. The discussion ends with a harsh evaluation of its future usefulness.Read more...
Blogged with Flock
This tutorial describes how to install a complete mailserver using Postfix and Dovecot on an Arch Linux machine or VPS.Read more...
Blogged with Flock
This document describes how to install a PureFTPd server that uses virtual users from a MySQL database instead of real system users.Read more...
Blogged with Flock
This is a howto about setting up a proffessional PHP IDE using Eclipse by hand.Read more...
Blogged with Flock
A recent thread on the lkml discussed a blog entry stating that minimal ZFS support for GRUB was available under the GPL license, "we could now use that code to implement support for ZFS in the Linux kernel."Read more...
Blogged with Flock
IronRuby is a .NET implementation of Ruby being developed by Microsoft (specifically, by John Lam). The project has matured significantly in the past year, and IronRuby is well on its way to running Rails applications (it already works with very simple ones). IronRuby's major benefit is that it allows Ruby code to access a massive range of .NET libraries and services.Read more...
Visit ECODAZOO.COM
Linux® loadable kernel modules, introduced in version 1.2 of the kernel, are one of the most important innovations in the Linux kernel. They provide a kernel that is both scalable and dynamic. Discover the ideas behind loadable modules, and learn how these independent objects dynamically become part of the Linux kernel.Read more...
Blogged with Flock
"Hurrah! 2.0 has been released!" said Matthew Dillon, announcing the eighth major release of DragonFly BSD. This release is the first to include HAMMERRead more...
Blogged with Flock
How I got into iPhone development
Common Sense: Disabling Linux Kernel Modules, blog by John Buswell, CEO and CTO of Spliced Networks LLC.
There's nothing new about the need for exception handling, which is a key feature in embedded applications. This article, which first appeared 20 years ago, describes exception handling in detail.Read more...
The JUNOS Software Architecture, an interesting blog by Jeff on how Jupiter developers tune the freeBSD kernel and the advantages of their modular architecture.Read more...
How do you read and write files from a kernel module? Wait, make that “how would you read and write files from a kernel module if that weren't a bad thing to do?”Read more...
cfix is an xUnit testing framework for C/C++, specialized for Windows development (32/64 bit). cfix supports development of both user and kernel mode unit tests.cfix - Unit testing for C and C++ on Win32
Benchmarking hardware RAID vs. Linux kernel software RAID (newsforge)
You can benchmark the performance difference between running a RAID using the Linux kernel software RAID and a hardware RAID card. My own tests of the two alternatives yielded some interesting results.
Read it...
Writer tells Penguinistas to chill on closed source
eWeek - New York, NY
The kernel "has safeguards in place to ensure that it will never cross streams with code that is not licensed with an open source license," he writes. ...
Read it...
KVM Gains Additional Support in Linux 2.6.26 Kernel and Native ...
By Scott Delap
The new 2.6.26 version of the Linux kernel has been released after three months of development with enhanced KVM support. In related news the KVM development team has announced achieving native network IO performance using pci ...
Read it...
Early look at AMD’s Socket G34
Have you heard about a book called Beautiful Code? This book is composed of 33 essays by well-known computer scientists and software engineers on the same question - “What is the most beautiful piece of code you know?”.Read the blog on Beautiful Code...
This short guide explains how you can configure software RAID1 during the initial installation of an Ubuntu 8.04 ("Hardy Heron") system.HowTo...
A step-by-step guide on how to do a manual full encryption of the system.HowTo...
This long-standing odd/even development model was officially scrapped in 2004 thanks to the success that Linus and Andrew Morton were having working together, and significant "unstable" development began happening between each 2.6.Z release.Read more...
Generic programming is an effective methodology for developing reusable software libraries. Many programming languages provide generics and have features for describing interfaces, but none completely support the idioms used in generic programming. To address this need the language G was developed . The central feature of G is the concept, a mechanism for organizing constraints on generics that is inspired by the needs of modern C++ libraries.Read more...
Foundation is a preservation system for users’ personal, digital artifacts. Foundation preserves all of a user’s data and its dependencies—fonts, programs, plugins, kernel, and configuration state—by archiving nightly snapshots of the user’s entire hard disk. Users can browse through these images to view old data or recover accidentally deleted files. To access data that a user’s current environment can no longer interpret, Foundation boots the disk image in which that data resides under an emulator, allowing the user to view and modify the data with the same programs with which the user originally accessed it.Read it...
This paper describes the procedure for enhancing the Linux operating system with Internet Protocol version 6 (IPv6) networking feature. This paper also describes the linux kernel with IPV6 networking support, booting linux desktop machines with new IPV6 network supportive kernel, and its graphical representation.Find it...
jMar's Blog: Building Your First jQuery Plugin
This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users.HowTo...
A new feature being introduced in HTML 5 is the addition of custom data attributes. - Blog by John Resig on how to use it.Read it...
Yahoo has opened its search for developers to customize in its latest step in what it calls its Open Strategy, a plan to make Yahoo a platform.Read it...
Linux System Programming: Talking Directly to the Kernel and C LibraryDownload it...
"Ok, the last -rc obviously wasn't the last one after all, since here's a new one," noted Linus Torvalds, announcing the 2.6.26-rc9 kernel.Read more...
NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline their systems.
Find it here...
21 Online Free Web Based Applications That You Probably Would Love To Use Every Day! , I'm sure you will be using more than 5 of them.
A hidden operating system is a system (for example, Windows Vista or Windows XP) that is installed in a hidden TrueCrypt volume. It is impossible to prove that a hidden TrueCrypt volume exists (provided that certain guidelines are followed; for more information, see the section Hidden Volume) and, therefore, it is impossible to prove that a hidden operating system exists.
Read it...
NFS, Network File System, is a file sharing protocol in a UNIX network. It is the de facto UNIX standard. It is strongly associated with UNIX systems, although it can be used on any platform such as Macintosh and Microsoft Windows operating systems. This tutorial shows how to set up an NFS server and client on Ubuntu 8.04 (AMD64).How To...
Evgeniy Polyakov announced the latest release of his Parallel Optimized Host Message Exchange Layered File System, POHMELFS.Read more...
Find is a beautiful tool, Blog by Eric
This tutorial explains how you can set up a FreeRadius server with Wifi authentication and accounting on CentOS 5.HowTo...
DjbDNS is a collection of Domain Name System tools. It includes software for all the fundamental DNS operations. This tutorial shows howto setup the DjbDNS.HowTo...
This tutorial shows how to set up a CentOS 5.2 server that offers all services needed by ISPs and web hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Dovecot POP3/IMAP, Quota, Firewall, etc.HowTo...
UBF is a data encoding that allows structured terms (rather like XML) to be sent over the network. It also includes a protocol checking scheme to automatically determine if sequences of typed messages follow a particular protocol.Read the blog...
ARG_MAX, maximum length of arguments for a new processor why do you get? How to resolve?Read more here...
SourceForge.net is proud to present our 2008 Community Choice Awards. This is the third year of our awards program, and we think it's going to be the best yet.Vote here...
Stob Are you a Web 1.0 duhveloper in a rut? Is rich web codery passing you by in Internet time? Do you nibble on the ASCII Alphabetti Spaghetti of server-side processing, while younger, feck- (careful) and talent-less colleagues slurp the UTF-Eightti Vermicelli of client-side coquetry?Read it...
The first, most basic, skill: be able to distinguish the different versions of the web.
The Pencil Project's unique mission is to build a free and opensource tool for making diagrams and GUI prototyping that everyone can use.Home - Pencil Project
So many sites these days are filled with what can only be called “debris”. Useless remnants of other sites: things of no real use, yet there anyway. The right-hand columns and after-article white-space has turned into a free-for-all of features that may as well be advertising banners. Blog from Big Contrarian.Read it....
We are two TV addicts. The internet is great to provide us with our favorite TV shows free, early and watchable on demand. We always had to spend lots of time to keep up to date with the newest episodes. Until ted, our torrent episode downloader.download ted here...
Well, I have written so far two tutorials with LUKS/dm_crypt involved. First one was how to enable encryption on Feisty Fawn (wasn't included back then by default) and the other one was how to reboot/unlock through a remote connection.HowTo
The microcontroller is widely used in many devices, which works in environment. The microcontroller has to face the challenges from EMI, voltage stability, crystal failure and much other interference. If the interferences are strong enough to disturb the operation, the system design should be secure enough to deal with these matters, one good practice is to reset and go on with previous normal operation state . However, a simple reset is not enough at all. I will demonstrate the basic principle for the system reset and state restore. Please keep in mind that the terminologies used in this article may come from different microcontrollers.Read more...
Application is using SCSI pass through native Windows 2000/XP interface to access adapters and devices.One can rescan all SCSI buses of selected adapter and application dynamically adds newly connected devices and removes disconnected ones. One can execute SCSI commands manually using menu commands.Find more....
Reverse Engineering Linux Kernel Image and Modules
If an application is useful, then the network of users will grow crazily fast at some point. As more and more mission-critical applications are now running on Java EE, many Java developers are caring about scalability issues. However, most of popular Web 2.0 sites are built with script languages, and there are a lot of voices to doubt the scalability of Java Applications. In this article, Wang Yu takes real world cases as examples to explain ways on how to scale Java applications based on his experiences on the laboratory projects, and at the same time, bring together practice, science, algorithms, frameworks, and experience on failed projects, to help readers on building high scalable Java applications.Read it...
mod_defensible is an Apache 2.x module intended to block spammers/hackers/script kiddies using DNSBL servers.HowTo...
The operating system I currently use on my primary computer is Windows 95 OSR2. Furthermore, not only do I use Windows 95 extensively, but I prefer it to Windows 98, ME, 2000, XP, and Vista...interesting blog by Andrew TurnbullRead it...
"Thousands of Neo FreeRunners have been loaded into planes and fired around the world," announced Sean Moss-Pultz, the Openmoko CEO, in a frequently philosophical email titled "let us impact the material world", posted to the Openmoko community mailing list.Read here...
A tutorial on kernel development by Bran.
Start here...
A good article on ACPI states starting with difference between ACPI and APM and then covering Global system states, Sleeping states, Device power states, CPU power states, CPU/Device performance states and CPU thermal monitor states. Comparison between each states and a quick reference guide for each states.
Read more...
Today's ISP environment requires authenticated SMTP to be able to send emails. As a policy, authenticated SMTP helps cut down on folks sending SPAM and allows the ISP to track which account is sending what type of email content for further demographic study.Read more...
So what if Ubuntu is a fast operating system?... There is always room for some more tweaking... and I am talking here about some aspects that are NOT useful for the end-users (yes YOU, the regular Ubuntu user). The hacks presented in this guide will greatly improve the overall performance of your Ubuntu 8.04 Linux OS.Read more...
Google's framework for writing C++ tests on a variety of platforms (Linux, Mac OS X, Windows, Windows CE, and Symbian). Based on the xUnit architecture. Supports automatic test discovery, a rich set of assertions, user-defined assertions, death tests, fatal and non-fatal failures, various options for running the tests, and XML test report generation.Get it here...
Intel Corp. and Advanced Micro Devices Inc. both gained momentum in the first quarter of this year as the longtime price war between the rival chip makers slowed.Read more...
Yukihiro "Matz" Matsumoto expressed his intention to standardize Ruby. The aims of the standardization are to improve the compatibility between different Ruby implementations like JRuby and IronRuby and to ease Ruby's way into the Japanese government, which in 2007 announced guidelines to use open standards rather than specific products.Read more...
In this article, look at some top XML schemas that provide solutions for all sorts of problems, from the basics of Web services to data description. You'll also cover database-like solutions that involve contacts and invoices. The schemas in this article were chosen for their usefulness and utility, plus their impact on the XML community in how information is shared and exchanged using the XML format.Read in detail...
The Evil Side of Google? Exploring Google's User Data Collection, Good Analysis.
This guide explains how to set up the Open Source version of Atmail (Atmail Open) on your ISPConfig server.Read more...
This guide shows how you can write the Apache2 access log to a MySQL database instead of a file. To achieve this, I use the Apache2 module mod_log_sql. I'm using a Debian Etch server in this tutorial.Read more...
HTTPMR is an implementation of Google's famous Map/Reduce data processing model on clusters of HTTP servers.Read more...
Opensuse Linux version 11.0 has been released and available for download from mirrors (jump to download location).Download...
Firefox 3.0 has been released and available for immediate download. Mozilla foundation is aiming to set a world record for the most downloads in 24 hours. IE's lack of compliance with web standards and security issue made Firefox more popular among the techsavy / geek users.Download Here...
Alan Baghumian has announced the release of Parsix GNU/Linux 1.5r0, a Debian-based desktop distribution and live CD:Get it here...
150 Linux kernel developers, including Alan Cox, signed a “Position Statement” decrying the use of any closed source kernel module or drivers in Linux.Read more...
This tutorial will walk you through setting up Shorewall (Shoreline) 4.0 firewall on CentOS 5.1 , this can easily be adapted to any other Linux distribution out there.How To Set Up Shorewall
Eliza is a sequential, functional logic programming language. It borrows concepts from Prolog, Lisp, Icon, Haskell, Bash, Oz and C/C++.Want to know more about Eliza?
What Is RubyFrontier?GoTo RubyFrontier Documentation
It’s a way of maintaining and generating Web sites.
This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine.Read more...
Features, I’ve recently come to realize, can be obstacles. Problems. The more powerful an application is, the more specialized it is, and thus with increased power its intended audience shrinks, and ironically, it becomes more, not less, vulnerable to competition.Read more...Blog
tolua is a tool that greatly simplifies the integration of C/C++ code with Lua. Based on a cleaned header file, tolua automatically generates the binding code to access C/C++ features from Lua. Using Lua API and tag method facilities, tolua maps C/C++ constants, external variables, functions, classes, and methods to Lua.Read more...
C++ Style Guide - Good for Novice programmers and experienced programmers.Read more...