The Wayback Machine - https://web.archive.org/web/20080705060248/http://www.unixreview.com:80/

Shell Corner: Littera Delenda Est (Part Two)
Ed Schaefer
In this month's Shell Corner, Royce Williams provides part two of his attack on removing unusual characters in filenames.
Wed, 30 May 2007

Regular Expressions: Python's Mechanization
Cameron Laird
In this month's Regular Expressions column, Cameron and Kathryn look at using the dynamic language Python to handle specific automation needs.
Wed, 30 May 2007

Elements of Efficient and Secure Service Provisioning with Solaris
Kristy Westphal
Westphal looks at the elements involved in building a server in Solaris 10 that will take advantage of all the available features.
Wed, 30 May 2007

Test Your Knowledge of Users and Groups
Emmett Dulaney
Emmett offers some questions to test what you know about user and group fundamentals.
Wed, 30 May 2007

Certification Changes and Updates
Emmett Dulaney
Emmett takes a look at the latest changes made to some of the more popular certification exams and what you need to know.
Wed, 30 May 2007

Examining SlickEdit 2007: Code Quick | Think Slick
Emmett Dulaney
Emmett takes a look at the latest release of one of his "favorite" utilities -- Visual SlickEdit 2007.
Sun, 29 Apr 2007

Regular Expressions: Good Works with Real Databases
Cameron Laird
Cameron and Kathryn discuss how sanitizing databases while learning a new software technology can be a rewarding experience.
Sun, 29 Apr 2007

Shell Corner: Littera Delenda Est
Ed Schaefer
Reader Royce Williams describes his experiences removing files with tricky characters in their filenames in part one of his article.
Sun, 29 Apr 2007

More Forensic Tools
Kristy Westphal
Westphal takes a look at some old and new tools for forensic processing of hard drives.
Sun, 29 Apr 2007

Book Review: Beginning C: From Novice to Professional
Ed Schaefer
Ed looks at the latest edition of Beginning C. He explains why novices who want to learn "C" on a C99 compiler should read this book.
Sun, 29 Apr 2007

From the Archives

Book Review: Comparing, Designing, and Deploying VPNs
Emmett Dulaney
My first thought when looking at this book was that if it contained no valuable information, I could still use it to prop open the door when the weather warmed. At well more than 1,000 pages, it gives the impression of being a brick. I am happy to report, however, that we�ve had many nice days since this book arrived, and there is no possibility that it will ever be used for anything other than reference � it is that good.
Thu, 1 Jun 2006

The Open Road: Testing Services with Telnet
Joe "Zonker" Brockmeier
There's been some hubbub lately about Andrew Tridgell's supposedly "reverse engineering" the BitKeeper protocol. It turns out, Tridgell did nothing more complicated than using telnet to talk to a BitKeeper server. Though I'm not one to advocate using telnet as a way to administer remote systems, it can still come in handy from time to time � primarily as a way to test services. This month, I'll walk you through testing some basic services using nothing more than plain ol' telnet.
Tue, 26 Apr 2005

Debugging Expect
Cameron Laird
A "transition error" led to the delay of this article for more than a year. Although it was originally written early in 2004, its content remains equally accurate and pertinent today. This is typical for Expect � its author, Don Libes, expected it to be imitated and surpassed soon after he first released it at the beginning of the 1990s, but that's never happened. The book he published about it in 1994 remains in print, not because of the interest of antiquarians, but because Expect continues in 2005 to solve the important problems it addresses better than any other tool. Read on, then, and learn how you can make even better use of Expect with a few simple debugging techniques.
Mon, 9 Jan 2006

Spyforce-AI
Kristy Westphal
Whenever I hear of a software package that claims to protect against something ambitious like insider threats, identity theft, and cyberfraud, I have to get a closer look. Spyforce-AI is an ambitious and unique software package that boasts of addressing all three of these areas. If you, too, think that this is worth a closer look, read on to find out about my experience with the product. Note that this review was done on a pre-release version of the products current version 2.0.
Wed, 19 Jul 2006

Book Review: Brute Force: Cracking the Data Encryption Standard
Ben Rothke
Brute Force: Cracking the Data Encryption Standard is the story of the life and death of DES (data encryption standard). In the early 1970s, the U.S. government put out an open call for a new, stronger encryption algorithm that would be made into a federal standard, known as FIPS (Federal Information Processing Standard.). Numerous solutions were submitted as the DES candidate, including one from IBM. The IBM solution, originally called Lucifer, was chosen to be used as the encryption algorithm. After that, it became known as DES.
Tue, 27 Sep 2005

Sys Admin Spotlight

CMP DevNet Spotlight

Global Web Site Performance Improvement
Jeffrey Fulmer explains how to get a comprehensive picture of your site's performance and describes some tips for improving it.

In the News

CD-ROM

Sys Admin and The Perl Journal CD-ROM version 11.0

Version 11.0 delivers every issue of Sys Admin from 1992 through 2005 and every issue of The Perl Journal from 1996-2002 in one convenient CD-ROM!

Order now!




MarketPlace

Get the ports you need for your VMs to succeed.
HP network adapters help get the most from your virtualized servers. Learn more at HP.IntelVT.com.

Online Crash Analysis
Automatically capture customer crash data, no debugger required. Support for .NET, C++, OS X, Java.

Discover WinDev 11 RAD
and develop 10 times faster ! ALM, IDE, .Net, PDF, 5GL, Database, 64-bit, etc. Free Express version

uCalc Fast Math Parser - for C#, Delphi, VB, VC++, PB, BCB
Evaluate expressions defined at runtime. See why customers prefer uCalc, and why you will too.

Wanna see your ad here?