Welcome to UnixReview.com

Main Menu
  Home
  Archives
  Reviews
  Books
  Geek Links
  Contact Us

Sections
  Regular
  Expressions

  Tool of the Month
  Open Source
  Certification
  Shell Corner
  lost+found


Newsletter
Get the Newsletter
Get the Newsletter

 
section
The View Up Top

February 26, 2002 -- Laird demonstrates the beauty of writing COM-Web Services gateways in Perl, Zonker highlights three nifty utilities, and Ronthal explains why it may be wise to avoid jumping on the Java bandwagon.

What's New


Easy COM-WEB Services Gateways

by Cameron Laird   February 2002
Laird demonstrates the benefits of using freely available code to write COM-WS gateways in Perl.

Tool of the Month: The Name Game
by Joe "Zonker" Brockmeier   February 2002
Zonker shares three handy utilities from his toolbox. Read about Change Suffix, Rename (one of several utilities by that name), and a Regular Expression wizard called ^txt2regex$.

Why Java Isn't Appropriate for Everything
by Adam Ronthal   February 2002
Although Java is an excellent platform and delivers "write once, run anywhere" capabilities, it is not the appropriate tool for every situation. Ronthal uses real-life scenarios to illustrate the effective use of Java.

Regular Expressions: What You Should Know about Tk
by Cameron Laird and Kathryn Soraiz   February 2002
Laird and Soraiz clarify Tk's identity as toolkit, language, and library.

Firewall Roundup
Review by Joe "Zonker" Brockmeier   February 2002
Zonker takes a look at firewall offerings from SuSE, Mandrake, and Coyote Linux. He notes the strengths, weaknesses, and most appropriate use for each firewall solution.

Beyond Our Control?
Review by Ben Rothke   February 2002
Rothke notes that, although most of us aren't lawyers, the topics in this book -- cyber-security, consumer fraud, free speech rights, intellectual property rights, file-sharing programs, and more -- are worth reading about.

Shell Corner: pget.awk
Hosted by Ed Schaefer   February 2002
Ed turns the spotlight on a "Generic Parameter Parsing Engine" submitted by David Thompson.

The Open Road: Procmail
by Joe "Zonker" Brockmeier   February 2002
Zonker does a whirlwind tour of Procmail's mail filtering capabilities and provides some sample recipes before winding things up with a brief Microsoft commentary.

Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios
Review by Lee Ratzan   February 2002
Are you up for a good mystery, cloaked in the guise of an incident report scenario? This book contains 20 incident report scenarios, complete with elements of deception, intrigue, false identity, forensics, complexity, and mitigation. A sample solution is provided for each scenario.

The Insider
by Mike Schiffman   February 2002
A sample challenge from the book Hacker's Challenge. Follow this security-breach scenario and test your incident-response skills against the experts' solution.

Certification Scope: Examining the LPI 201 Exam
by Emmett Dulaney   February 2002
Emmett continues his coverage of Level-Two Linux certifications. Find out exactly what you need to know for the LPI 201.

Solaris 8 Security
Review by Ben Rothke   February 2002
Rothke discovers a resource that won't waste your time or your money -- or a lot of trees.

How Web Cache Proxies Do and Don't Save on Internet Costs
by Stanley Wong   February 2002
Wong shares a sample Perl script that can be used to analyze Web cache proxy effectiveness (as opposed to the cache proxy hardware/software performance).

Tridia VNC
Review by Joe "Zonker" Brockmeier   January 2002
For those of you with a hankering for double vision -- that is, viewing your desktop from multiple locations -- Zonker explores multi-platform remote control with Tridia VNC.

Computer Forensics Roundup
Review by Ben Rothke   January 2002
With cyber crime on the rise, computer forensics is emerging as a vital part of information systems management. Investigators must know what to preserve as evidence, where to find it, and how to properly handle it for admission in a court of law. Rothke reports on three books whose authors address computer forensics from differing perspectives.

Tracking an Offender
by Warren Kruse and Jay Heiser   January 2002
Kruse and Heiser discuss tricks and tools to help you track and catch savvy crackers.

Regular Expressions: curl Simplifies Web Retrieval
by Cameron Laird and Kathryn Soraiz   January 2002
Laird and Soraiz explore curl, a portable command-line executable for convenient Web retrieval, along with its associated library, libcurl.

 

section
  Open Source Reviews Sys Admin
   
  Certification Books Shows
 
section
 
In The News

Data Binding Exploit in IE, Outlook

Java Winning in Telematics

Malicious Java Applets a Threat to Netscape, IE

Breakthrough in Plastic-Based Optical Devices



Recent Highlights

Sun/Cobalt Qube Server
Review by Peter Baer Galvin

Tool of the Month: TWiki
by Joe "Zonker" Brockmeier

   
Home | Top


Copyright © 2002 UnixReview.com, UnixReview.com's Privacy Policy
Comments about the Web site: scoady@cmp.com
SDMG Web Sites: C/C++ Users Journal, Dr. Dobb's Journal, MSDN Magazine, Sys Admin, SD Expo, SD Magazine, UnixReview.com, Windows Developer, TPJ, BYTE.com