I have enjoyed your guide to the Linux desktop series immensely, and I was delighted to see that you wrote about my favorite window manager, Window Maker. Of course, I wasn't too terribly happy with your lack of praise for my darling, but still, I don't want to start a holy/flame war. I merely wanted to inform you of one thing. —Robert Wade firstname.lastname@example.org
I'm glad you liked the series. There is one more coming, which should be out in the next couple of months, that does basic coverage of the remainder of the window managers out there. —Michael J. Hammel email@example.com
I know that exaggerating about how long one has been using Linux is a long-standing tradition for some people in the community, but it's getting a little out of hand.
In the June 2000 issue on page 98, the article claims that H. J. Lu discovered Linux in 1990. That's simply amazing, since Linus announced the project on July 3, 1991. (www.li.org/li/linuxhistory.shtml)
Perhaps Mr. Lu has the capability of seeing into the future? —Dave Whitinger firstname.lastname@example.org
I neglected to mention an important point in my article on syslogd in the July issue of Linux Journal: If you plan to use the network features of syslogd, it is very important that this port be behind a strong and properly configured firewall router. If not, the feature should not be used. The network syslogd interface is a great way to do remote denial of service attacks, and even some far more insidious attacks. The denial of service can be to both CPU and disk, since sending tons of spurious messages can make syslogd fill a disk drive. Moreover, such messages may be used to obscure other evil activities which you might lose in a flood of phony messages.
Even more frightening is the possibility that you are watching some log files with, say, poorly written Perl scripts that interpolate variables containing strings from syslog-generated log files. There are some clever Perl hacks where you can compose strings that will execute programs as the user running the script. Such strings could be embedded in fake messages sent to your syslog d<\#230;>mon.
The upshot of all this is that while collecting logs from multiple machines over a network is a very nice and useful feature, you must be sure to prevent machines outside your network from reaching this port.
This is an important point, and I hope you can find room for my letter! Thanks a lot!
Here is the corrected Listing 1 to include with my other comment.
Due to an accident of typesetting, the syslog.conf listing in the July 2000 issue was incorrect. The correct listing appears below.
—Michael A. Schwarz email@example.com
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
|Non-Linux FOSS: Seashore||May 10, 2013|
|Trying to Tame the Tablet||May 08, 2013|
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- RSS Feeds
- New Products
- Using Salt Stack and Vagrant for Drupal Development
- Drupal Is a Framework: Why Everyone Needs to Understand This
- A Topic for Discussion - Open Source Feature-Richness?
- Home, My Backup Data Center
- Validate an E-Mail Address with PHP, the Right Way
- New Products
- Readers' Choice Awards
- Ahh, the Koolaid.
5 hours 24 min ago
- git-annex assistant
11 hours 24 min ago
- direct cable connection
11 hours 47 min ago
- Agreed on AirDroid. With my
11 hours 57 min ago
- I just learned this
12 hours 1 min ago
12 hours 31 min ago
- not living upto the mobile revolution
15 hours 22 min ago
- Deceptive Advertising and
15 hours 58 min ago
- Let\'s declare that you have
15 hours 59 min ago
- Alterations in Contest Due
16 hours 24 sec ago
Enter to Win an Adafruit Prototyping Pi Plate Kit for Raspberry Pi
Congratulations to our winners so far:
- 5-8-13, Pi Starter Pack: Jack Davis
- 5-15-13, Pi Model B 512MB RAM: Patrick Dunn
- Next winner announced on 5-21-13!