The Wayback Machine - https://web.archive.org/web/20080509082035/http://www.unixreview.com/

Shell Corner: Littera Delenda Est (Part Two)
Ed Schaefer
In this month's Shell Corner, Royce Williams provides part two of his attack on removing unusual characters in filenames.
Wed, 30 May 2007

Regular Expressions: Python's Mechanization
Cameron Laird
In this month's Regular Expressions column, Cameron and Kathryn look at using the dynamic language Python to handle specific automation needs.
Wed, 30 May 2007

Elements of Efficient and Secure Service Provisioning with Solaris
Kristy Westphal
Westphal looks at the elements involved in building a server in Solaris 10 that will take advantage of all the available features.
Wed, 30 May 2007

Test Your Knowledge of Users and Groups
Emmett Dulaney
Emmett offers some questions to test what you know about user and group fundamentals.
Wed, 30 May 2007

Certification Changes and Updates
Emmett Dulaney
Emmett takes a look at the latest changes made to some of the more popular certification exams and what you need to know.
Wed, 30 May 2007

Examining SlickEdit 2007: Code Quick | Think Slick
Emmett Dulaney
Emmett takes a look at the latest release of one of his "favorite" utilities -- Visual SlickEdit 2007.
Sun, 29 Apr 2007

Regular Expressions: Good Works with Real Databases
Cameron Laird
Cameron and Kathryn discuss how sanitizing databases while learning a new software technology can be a rewarding experience.
Sun, 29 Apr 2007

Shell Corner: Littera Delenda Est
Ed Schaefer
Reader Royce Williams describes his experiences removing files with tricky characters in their filenames in part one of his article.
Sun, 29 Apr 2007

More Forensic Tools
Kristy Westphal
Westphal takes a look at some old and new tools for forensic processing of hard drives.
Sun, 29 Apr 2007

Book Review: Beginning C: From Novice to Professional
Ed Schaefer
Ed looks at the latest edition of Beginning C. He explains why novices who want to learn "C" on a C99 compiler should read this book.
Sun, 29 Apr 2007

From the Archives

Shell Corner: Safely Sharing Screen Sessions with sudo
Ed Schaefer, Rod Knowlton
Knowlton describes a couple of tempting but insecure methods for easing the work of sharing screen sessions, reveals their faults, and then presents a set of scripts that act together to provide a safe, easy to use alternative.
Wed, 15 Mar 2006

Book Review: IPv6 Network Administration
Peter Salus
IPv6 was intended to be a quick fix where the depletion of IPv4 address space was concerned (I've written about the history in my Big Book of IPv6 Addressing RFCs [2000]). But several developments intervened: CIDR, NATs, and RFC 1918 being the most significant. But, over the years, as the IETF committees toiled, the pressure of needing address space waned, and other things took on importance: VPNs and security are examples of this. And it has become quite clear that while network administration has always been more than just a piece of cake, expanding to 128-bit addressing together with filtering, firewalls, and the realization that IPv6 means IPv4 plus IPv6 will not make things simpler. (One can only envy those who had to deal with 5, 6, or 8-bit addressing 30-35 years ago.) IPv6 should yield more efficient routing, autoconfiguration, end-to-end security, generally superior QoS, and solid (rather than jury-rigged) features for mobile networking.
Tue, 19 Apr 2005

New Year, More Security Challenges
Kristy Westphal
Find out what amendments to federal rules occurred to civil procedures in 2006.
Sat, 30 Dec 2006

Marcel's Linux App of the Month : GNU Solfege
Marcel Gagn�
When you know the notes to sing, you can sing most anything. If that sounds like Julie Andrews in the "Sound of Music", then you understand precisely what I'm going to talk about today. And, yes, as strange as this introduction sounds, this is Marcel's Linux Application of the Month. I'm just going to take you on a musical journey.
Tue, 18 Oct 2005

An Imagined JavaScript Conversation
Cameron Laird, Kathryn Soraiz
JavaScript!? Yes, JavaScript. You know, we seem to have this same conversation every couple of years. Yes, I wrote it all in JavaScript.
Mon, 30 Oct 2006

Sys Admin Spotlight

CMP DevNet Spotlight

C++/CLI: Cloning
Making copies of heap-based objects

In the News

CD-ROM

Sys Admin and The Perl Journal CD-ROM version 11.0

Version 11.0 delivers every issue of Sys Admin from 1992 through 2005 and every issue of The Perl Journal from 1996-2002 in one convenient CD-ROM!

Order now!




MarketPlace

See how EASY REMOTE SUPPORT can be. Try WebEx FREE!
DELIVER SUPPORT MORE EFFICIENTLY. Remotely Control Applications. Leap Securely through Firewalls!

TAKE CONTROL OF REMOTE COMPUTERS
Support, configure and install applications and updates remotely for greater efficiency.

IMPROVE YOUR SUPPORT EFFICIENCY
WebEx lets you remotely control, configure and install applications and updates more efficiently.

SOLVE SUPPORT ISSUES on the First Call!
REMOTELY CONTROL AND CONFIGURE SYSTEMS. Easily install applications, updates. All from your Desktop!

Wanna see your ad here?