Easy COM-WEB Services Gateways
by Cameron Laird
February 2002
Laird demonstrates the benefits of using freely available code
to write COM-WS gateways in Perl.
Tool of the Month: The Name
Game
by Joe "Zonker" Brockmeier
February 2002
Zonker shares three handy utilities from his toolbox. Read about
Change Suffix, Rename (one of several utilities by that name),
and a Regular Expression wizard called ^txt2regex$.
Why Java Isn't Appropriate for Everything
by Adam Ronthal
February 2002
Although Java is an excellent platform and delivers "write
once, run anywhere" capabilities, it is not the appropriate
tool for every situation. Ronthal uses real-life scenarios to
illustrate the effective use of Java.
Regular Expressions: What You
Should Know about Tk
by Cameron Laird and Kathryn Soraiz
February 2002
Laird and Soraiz clarify Tk's identity as toolkit, language, and
library.
Firewall Roundup
Review by Joe "Zonker" Brockmeier
February 2002
Zonker takes a look at firewall offerings from SuSE, Mandrake,
and Coyote Linux. He notes the strengths, weaknesses, and most
appropriate use for each firewall solution.
Beyond Our Control?
Review by Ben Rothke
February 2002
Rothke notes that, although most of us aren't lawyers, the topics
in this book -- cyber-security, consumer fraud, free speech rights,
intellectual property rights, file-sharing programs, and more
-- are worth reading about.
Shell Corner: pget.awk
Hosted by Ed Schaefer
February 2002
Ed turns the spotlight on a "Generic Parameter Parsing Engine"
submitted by David Thompson.
The Open Road: Procmail
by Joe "Zonker" Brockmeier
February 2002
Zonker does a whirlwind tour of Procmail's mail filtering capabilities
and provides some sample recipes before winding things up with
a brief Microsoft commentary.
Hacker's Challenge: Test
Your Incident Response Skills Using 20 Scenarios
Review by Lee Ratzan
February 2002
Are you up for a good mystery, cloaked in the guise of an incident
report scenario? This book contains 20 incident report scenarios,
complete with elements of deception, intrigue, false identity,
forensics, complexity, and mitigation. A sample solution is provided
for each scenario.
The Insider
by Mike Schiffman
February 2002
A sample challenge from the book Hacker's Challenge. Follow
this security-breach scenario and test your incident-response
skills against the experts' solution.
Certification Scope: Examining
the LPI 201 Exam
by Emmett Dulaney
February 2002
Emmett continues his coverage of Level-Two Linux certifications.
Find out exactly what you need to know for the LPI 201.
Solaris 8 Security
Review by Ben Rothke
February 2002
Rothke discovers a resource that won't waste your time or your
money -- or a lot of trees.
How Web Cache Proxies Do and
Don't Save on Internet Costs
by Stanley Wong
February 2002
Wong shares a sample Perl script that can be used to analyze Web
cache proxy effectiveness (as opposed to the cache proxy hardware/software
performance).
Tridia VNC
Review by Joe "Zonker" Brockmeier
January 2002
For those of you with a hankering for double vision -- that is,
viewing your desktop from multiple locations -- Zonker explores
multi-platform remote control with Tridia VNC.
Computer Forensics Roundup
Review by Ben Rothke
January 2002
With cyber crime on the rise, computer forensics is emerging as
a vital part of information systems management. Investigators
must know what to preserve as evidence, where to find it, and
how to properly handle it for admission in a court of law. Rothke
reports on three books whose authors address computer forensics
from differing perspectives.
Tracking an Offender
by Warren Kruse and Jay Heiser
January 2002
Kruse and Heiser discuss tricks and tools to help you track and
catch savvy crackers.
Regular Expressions: curl
Simplifies Web Retrieval
by Cameron Laird and Kathryn Soraiz
January 2002
Laird and Soraiz explore curl
, a portable command-line
executable for convenient Web retrieval, along with its associated
library, libcurl
.