Letters

Readers sound off.
Letters

Marry Me, Marry My LJ

This photo was taken when my wife and I were waiting to get married in the chapel on the second floor of New York City Hall. I just received the 100th issue of LJ and brought it along. You can tell from the photo that my wife was a little jealous. So the title for the photo is “Beauty or LJ”. Hope you like it.

—Ning Qian

Beauty or LJ: Bride-to-be Qing Xiang peeks at fiancé Ning Qian's Linux Journal (photo: Nicole Xiang).

Two FTP Proxies?

I enjoyed reading your article about setting up an FTP proxy [LJ, December 2002]. I was just curious about one point. You make a comment about not being able to configure the acceptable commands list differently for internal and external users. Is it possible to set up two proxies then route the incoming requests at the firewall for internal addresses to one proxy and those from external addresses to the other?

—John

Mick Bauer replies: That's an excellent idea! You could set up a proxy on the firewall for external users, with read-only permissions, and set up a proxy on some host on the inside for outbound transactions, with looser permissions. You could then configure your firewall to permit outbound FTP only if it originates from the designated internal proxy.

Acronym Recycling Department

It's great to see those huge old machines coming back! I saw an advert in Linux Journal for a CDC 6400, the baby brother of the immense CDC 6600. Of course today we could not use Freon to cool it. And software is coming back! SOAP, for instance, the Symbolic Optimal Assembly Program for the IBM 650. Magnetic drum memory will never die! I have even seen articles about ASP, the Attached Support Processor for the IBM 360/65. Who says I'm a dinosaur?

—Peter Chase, Alpine, Texas

Is ptrace Secure?

The articles on ptrace in the November and December 2002 issues were very informative. So what's to stop someone from using ptrace to insert some malevolent code in a running program? Forgive me for looking on the dark side.

—Walter S. Heath, Concord, Massachusetts

Keep thinking evil thoughts. You can't keep a system secure without studying possible attacks. Fortunately, you can only ptrace a process if it's your own process, or if you're root.

—Editor

Another OpenLDAP Win and a Fix

I have found an error in my article, “OpenLDAP Everywhere” [LJ, December 2002]. In the auto.home section on page 54, the gomerp entry has the line:

cn: super3

The line should read:

cn: gomerp
A reader contacted me after copying the entry exactly from the article. He has fixed his configuration and is up and running with unified logon. Matt Lung and I are very pleased with the article as published. Our mothers are very proud!

—Craig Swanson

Where's zNav?

We were a little disappointed by your article on the applications for the Zaurus. You listed many commercial applications and yet when it came to mapping/navigation software you listed only the free one. zNav and zNav Lite are the only Zaurus mapping/navigation products that use commercial navigation charts.

—Patrick Cannon, Barco Software, LLC

Installfest at 11,000 Feet

Here the world's highest Linux install event took place Saturday the 12th of December 2002, 11,000 feet above the sea. It was the first of its kind in this part of Bolivia—and maybe a world record when it comes to altitudes and Linux install events.

The organizers task force: Janus Sandsgaard, Edgar Ruiz, Juan Conorel, Devin Conde, Hardy Beltran, Christian Mollo and Jorge Castro.

—Janus Sandsgaard

Zaurus Articles Monthly, Please

Yesterday I was very happy to see that the Zaurus was on the cover of the January 2003 issue of LJ. I am involved in the OpenZaurus Project, and I would really appreciate a monthly section on the Zaurus on LJ.

—Paolo

______________________

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix