Lovers and users of free and open source software are a hardy bunch. They've seen it all: Microsoft EULAs, DRM, UEFI, proprietary software and constant attempts to prevent end users jailbreaking and rooting the devices they paid for with hard-earned cash. If you think you've seen and heard it all, well, you haven't. Apple may have trumped them all with a possibly unique EULA.
I am a great fan of the Gutenberg project, a noteworthy and honorable effort to digitize copyright-free texts. This project has released into the public domain over 20,000 classic books.
This article will explain how to integrate this huge body of material with the Ubuntu desktop.
Rosalyn Hunter writes about using Composer as a stand-in word processor. I too, have used it in this fashion on OS X. I like it for various reasons. For instance, I'm quite familiar with it, as I've used it for website authoring numerous times. It creates HTML files. I've come to the conclusion that HTML is not a bad “language” to use for a word processor, considering that it already allows for basic editing features--and then some. If it isn't obvious, Composer is an HTML editor that was part of the old Mozilla suite.
Ruby is currently one of the most fashionable and modern languages to program in. Ruby is synonymous with the Rails framework, which is a robust and deep framework used to prototype and then build stable and scalable web applications. Of course, Ruby has considerable potential in its own right. The book "Ruby by example, concepts and code" by Kevin C. Baird and published by No Starch Press will help you to learn the Ruby language via small incremental example scripts.
The application server GlassFish supports all the most modern and juicy features of Java Enterprise Edition (EE), formally known as J2EE. Made by Sun, the server has a dual purpose as both the official application server reference for Java EE and as a viable and scalable piece of software that performs well under most conditions. David R. Heffelfinger's book "Java EE 5 Development using Glassfish", published by PACKT, follows both purposes by exploring the frameworks and the server deployment; thus the books details resonate vigorously with the spirit behind the tool.
Plone is a well-known Content Management Systems (CMS). Since it's relatively easy to customize to a specific enterprises style and workflow, there is a healthy trade of services around the core software. Martin Aspeli, the book's author, is an active contributor to Plone. Heavy involvement in a project that you are writing about always bodes well for the potential value and quality of a book that you, the reader might be considering buying. Aspeli's book "Professional Plone Development", published by PACKT, proves this quality point once again.
Perl is an amazingly powerful and succinct language. Although not the most fashionable, Perl is consistent and supported on a vast range of platforms, probably even more than Java. Better still, it gets in and does the job quickly with very little fuss. Perl by Example written by Ellie Quigley and published by Prentice Hall is a comprehensive, example based, and thorough book.
Mainstream Linux distributions such as the ever-popular Ubuntu have the potential to contain thousands or tens of thousands of packages and have a wealth of supporting services activated on computer boot ups. Mark G. Sobell’s book A practical guide to Ubuntu Linux, published by Prentice Hall, describes the details of maintaining these complex structures on your own machine.
A few comments on my article The perfect network server in issue 17 requested some more in depth follow-up pieces. This is what I hope to be the first of those. It focuses on Exim, the mail transfer agent (MTA), specifically setting it up with spam scanning. It is based on setups I currently use, hosted on Debian GNU/Linux.
Gimp is universally used for image manipulation. However, with a bit of creativity and a couple of tricks, it can also be used as an audio filter! Here is how...
Moodle is a well-known and widely used online Course Management System. It is based on Apache and PHP and is normally associated with a MySQL database and GNU/Linux. The application has high market penetration and recognition, especially for schools. However, no matter how good a tool is, a poor teacher will only generate painful online learning experience. Moodle Teaching Techniques published by Packt and authored by William H. Rice IV focuses on best practices for constructing learning solutions.
The stability of an enterprise-wide infrastructure depends on understanding innovative, defensive security-related software. Linux Firewalls: Attack Detection and Response with iptables, psad and fwsnort written by Michael Rash and published by No Starch Press, outlines viable approaches that enable a defensive solution in depth.
Eighty percent of input to the brain is visual, and comes directly through the eyes. We humans are incredible machines with the ability to recognize patterns instantaneously. Machine technology is not capable of matching humans, and won't be for many decades. Security data visualization translates complex data relationships into meaningful visual patterns that humans can quickly interpret. The book Security Data Visualization: Graphical techniques for network analysis by Greg Conti and published by No Starch Press answers the important and core question: can visualization help with security? The answer is a resounding "yes".
The Apache Tomcat server is the most well known and deployed Servlet container for dynamic Java based web applications. Pro Apache Tomcat 6 by Matthhew Moodie (edited by Kunal Mittal and published by Apress) explains in exacting, systematic and well covered detail how to manage the latest version of this high quality, popular free software product.
Welcome to an introduction for the beginner to the basic manipulation of the MySQL database with free software. The purpose of this article is to show how universally straightforward it is to get started with installing and applying a high-grade enterprise ready database like MySQL, and to learn how to manipulate it via numerous free software approaches.
Honeypots look like victim systems waiting or searching for malware and other nefarious attacks, registering the enemy's practices in high-resolution gory, blood-ridden detail. Virtualization allows one system to act as a network of disparate victim OS’s and services. Security experts can observe attacks live or stored for detailed analysis, learn the methodology of Dr Evil and generate statistics for internet wide attacks.
MySQL is one of the dominant players in the database market—a solid pillar in the Linux, Apache, MySQL and PHP or LAMP stack. SQL for MySQL Developers, written by Rick F. van der Lans and published by Addison Wesley covers all significant topics of SQL with specific references to the MySQL dialect.
Sakai is an online Collaboration Learning Environment, CLE for short. Indiana University has proactively deployed it for 100,000 students, and over 120 other Universities are involved with their own local deployments or test beds. Clearly, this well received application is worth checking out and taking for a vigorous and thorough test run.
This article describes the work in progress of applying Ubuntu Linux sensibly within an underfunded school, and as part of a wider well thought out and alternative educational structure. I shall emphasise best practices and try my best not to dwell too much on the underlying technologies.
I am not paranoid... honest, but we are all surrounded, surrounded by consumer appliances such as wireless network routers, media centers and even some clever fridges and microwaves. I am even sure that my elder sons Robosapien is out to get me! At least the book Linux Appliance Design: A Hands-On Guide to Building Linux Appliances by the experienced Engineers (and now writers) Bob Smith, John Hardin, Graham Philips, and Bill Piece allows us to know our hidden enemies and build better appliance mousetraps.