Linux DevCenter    
 Published on Linux DevCenter (http://www.linuxdevcenter.com/)
 See this if you're having trouble printing code examples


OSCON Keynoters, Proxy Terms, C++ Principles, and Secure Cooking

by chromatic
Linux Newsletter for 06/23/2003

Hello there. This is the Linux newsletter, bringing to you every story you might have missed on ONLamp.com or the Linux dev center. Here's what's new:

Last week, two OSCON keynote speakers were gracious enough to answer several questions. The OSA Foundation's Mitch Kapor spoke about Chandler (an open source, Python-based PIM) and how desktop applications evolve. George Dyson, historian and Director's Visitor at the Institute for Advanced Study, explains how von Neumann's vision of computing is just now coming to pass and how it fits with biological models. Interesting stuff; be sure to catch their keynotes at OSCON (or our coverage on the OSCON 2003 site).

As usual, Noel Davis started the week with another Security Alerts. Potential remote exploits afflict the Linux 2.0 kernel series, Speak Freely, and Zen Track. Please check your versions and upgrade or disable as necessary.

George Belotsky has returned with the second part of a three part series on C++ memory management. In the last installment, he explained several common errors. This week, he explores Principles of C++ Memory Management. Programming effectively requires careful thought more than knowing the syntax of a language. Managing your expectations and learning how to design well will help you avoid the normal pitfalls.

Dru Lavigne's latest series on Unix administration started this week. She's now exploring proxies. Proxy Terminology 101 explains every term you might possibly hear in a useful discussion of proxies. She's just setting the stage for something more impressive, you know.

Finally, this week's book excerpt comes from the Linux Security Cookbook. Secure Cooking with Linux, part one explores public-key authentication with OpenSSH, encrypting your backups, and sanely merging log files. Handy.

To subscribe to the Linux newsletter (or any O'Reilly Network newsletters), visit https://epoch.oreilly.com/account/default.orm and select the newsletters you wish to receive in your user profile (you'll need to log in with your existing O'Reilly Network account -- if you don't yet have an account, you'll need to create one).

To change your newsletter subscription options, please visit https://epoch.oreilly.com/account/default.orm and click the"Manage My Newsletters" link. For assistance, send email to

That's all for this week. Next week's newsletter will include a game developer interview and another look at directory services for Linux.

Until then,

chromatic
chromatic@oreilly.com
Technical Editor
O'Reilly Network

ONLamp.com and Linux DevCenter Top Five Articles Last Week

  1. More Kernel Trouble
    Noel Davis looks at problems in Linux kernels, GNU Zip, xaos , Speak Freely, eterm , Hangul Terminal, typespeed ,mikmod ,kon2 ,zblast/xzb , and zenTrack.

  2. Video Playback and Encoding with MPlayer and MEncode
    No consumer Linux box is complete without the ability to play digital video files. Until recently, this was difficult -- the codecs weren't freely available or distributable. MPlayer seeks to change this. KIVILCIM Hindistan introduces MPlayer and demonstrates some of its features.

  3. Privacy and Anonymity in Email
    Email has been described as a postcard. Sure, it's rude to read someone else's mail, but it's trivial to do. There exist many technical means to protect your privacy and to help you communicate anonymously. David Mertz explores the history and current state of email protection.

  4. Nine Questions for Mitch Kapor
    Mitch Kapor heads the Open Source Applications Foundation , the group behind Chandler . His OSCON keynote explores whether and how collaborative development can bring open source software to the desktop. Mitch kindly agreed to a short interview as a teaser for his talk.

  5. Proxy Terminology 101
    You're probably reading this page through a proxy right now. You might be saving bandwidth, sharing an external IP address, or being protected from work-unsafe material, but could you tell a reverse proxy from an arp proxy? Dru Lavigne explains what these and other terms mean in preparation for installing and running proxies.


Return to the list of Linux Newsletters.

Return to the Linux DevCenter.

Copyright © 2009 O'Reilly Media, Inc.