Open Source Software for Real-Time Solutions by Charles Curley compares Cygnus's eCOS to RTLinux, both designed for the embedded system market. Is there a place for both?
Web Client Programming Using Perl by Robb Hill describes how to monitor your own web site using Linux and Perl, in particular the LWP modules. He supplies scripts for creating an HTTP ping utility, paging using the Skytel web site and paging for SNPP servers. Use these scripts and keep cooking with Linux.
Java Servlets by Doug Welzel is an introduction to writing and running Java servlets on Linux. Servlets are Java programs which extend the functionality of the server and can be used to replace CGI scripts.
Bisel Bank by Pablo Trincavelli is a “Linux Means Business” article describing how a bank in Argentina uses Linux for testing database and web applications.
Perl in a Nutshell by Jan Rooijackers is a book review describing the contents, what is good and bad about it and why you might want to buy it. Perl is one of the most popular scripting languages in use today and the “nutshell” books are one of O'Reilly's most popular series. Don't miss this one.
Java 2 Software Development Kit by Harry J. Foxwell is all about the latest version of the Java SDK from Sun. Mr. Foxwell is a System Engineer for Sun and knows his subject well.
LIMP: Large Image Manipulation Project by Valient Gough tells us about designing a new library for processing large images using a minimal amount of memory. In this project, he uses C++, the Qt library and plug-in types for a number of interfaces. LIMP is being used for scientific image-processing needs, particularly aerial and satellite images.
Some rogues are better off in dungeons. If you too are better off in a dungeon (or if your friends just think so), have a look at some of these classic console character-based role-playing games available for Linux. Have you ever wanted to be an @? Well, now you can, and as an @, you can guide yourself through hundreds of layers of algorithmically generated dungeons, encountering crazy creatures, mysterious treasures, problematic nymphs and even the notorious Kobolds, who burst when you strike them! What ever am I talking about?
Rogue was the creature that started it all. Written nearly 20 years ago, it was designed to run on “dumb terminals”, machines which were connected to mainframes but had no special powers of their own (such as graphics, for example). The intent was to produce a character-based adventure game, using the curses library, which would produce a new adventure every single time instead of reiterating the same plot over and over. This approach worked and produced a game which could surprise even its creators. Thus began a new genre of computer game, and generations of dungeon-crawlers were spawned.
Hack was one of the first Rogue-like games, and it introduced a new component—pets. You got to have a dog or cat wander about with you in the dungeon, and this animal was good company. Many items and new features were added, and the game became popularized in various formats across several platforms. As a child, I heard stories of a mysterious game called Hack which was supposedly a miraculous, ingenious game, vast and complex, like nothing I had seen before. In those days, stories soared into legends (like the rumor that Bard's Tale IV had been created but required a Cray supercomputer) and when I finally got around to Hack on the Amiga, it was already in another incarnation.
NetHack, the direct descendant of Hack, is the most famous of the Rogue-inspired games. It is extraordinarily complex, offering all sorts of classes, weapons, scrolls, magical rings, potions, creatures, locations and plots. The idea is that once you have outspent yourself (and your parents), you're better off seeking your fortunes underground by retrieving the Amulet of Yendor (well, so says http://www.gnu.org/; the game text has a different interpretation). Hence, you can become a Valkyrie (or a Wizard, Samurai, Rogue, Priest, Knight, Healer, Elf, Caveman, Barbarian, Archeologist or Tourist) and go out questing. There are dozens of levels which become immensely complicated, and the game draws on strategic thinking, cleverness and long-term strategy. NetHack is now available in two graphical versions, one based on Qt (QtNetHack) and one based on gtk (GnomeHack). These graphics are excellent and I recommend taking a look. This is a deep game (smile) which takes some time to get used to, but it's good fun and since it is a classic, it is a good way to expose yourself to hacker culture.
Moria is a Tolkien-inspired descendant of Rogue, written in 1983 for VAX machines and ported to UNIX in 1987. The point is to kill the Balrog. Dungeon levels are quite large, taking up several screens, as opposed to the single-screen dungeon levels found elsewhere. Hence, it is quite a bit larger than the original Rogue. Also, it features a town level, in case you want to come up for air. You can choose from numerous races and classes—if, for example, you've always wished to be a Hobbit (or believed you were one), now's your chance.
Angband is another Tolkien-inspired game (well, what isn't?) which was derived from Moria in 1990. The idea is to descend into a very deep dungeon and kill Morgoth, the Dark Enemy of Middle-Earth. The atmosphere is more serious than that of NetHack, so if the persistent humor and silliness of NetHack end up spoiling the fun for you, Angband is a good alternative. A developmental, multi-player version is also available.
ADOM, Ancient Domains of Mystery, is yet one more Rogue-like game which differs a bit from the others and offers much more in some areas. It has many different character classes, and the magical characters are especially interesting. A commercial version is planned, as well as a real paper-and-pen RPG (role playing game). ADOM is still version 0.9.9, but seems to have a large following especially among teenagers and players under age 10. It is being actively developed—the author doesn't seem to have run out of energy so far.
CrossFire is a different kind of game from the rest of these dungeon crawlers. The Linux Game Tome (http://happypenguin.org/) describes it as a cross between NetHack and Gauntlet, and that's actually fairly accurate. The game is graphical, multi-player (!) and immense. With over 150 different monsters, about 3000 maps, 19 character classes, about 65 different weapons, dozens of armours, helmets, shields and clothings, and 18 levels of magic available to wizards (with roughly 85 spells at last count), CrossFire is a whole different world in which you and your friends can live. Any number of people can have clients (even available for Java and Win32), but the server has to run on a UNIX-based system such as Linux. If you're tired of being an @ and want to be an animated graphic again, here's where you can do it!
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide