garg0yle writes "Police in San Diego were called to investigate an 11-year-old's science project, consisting of 'a motion detector made out of an empty Gatorade bottle and some electronics,' after the vice-principal came to the conclusion that it was a bomb. Charges aren't being laid against the youth, but it's being recommended that he and his family 'get counseling.' Apparently, the student violated school policies — I'm assuming these are policies against having any kind of independent thought?"
Aglassis writes: The US Senate recently passed a $50 billion global health initiative that will spend $41 billion for AIDS relief, $5 billion for malaria relief, and $4 billion for tuberculosis relief in high risk locations around the world. This bill is an expansion of the $15 billion President's Emergency Plan for AIDS Relief (PEPFAR) that was authorized in 2003. Senators John Kerry and Gordon Smith also succeeded in removing HIV restrictions in the Immigration and Nationality Act which will allow HIV positive individuals to travel to and from the United States and to attain citizenship. An amendment to name the bill for the recently deceased Senator Jesse Helms was also defeated.
dinotrac writes: "Somebody special is coming over for dinner. You're not a chef, but you can cook well enough to get by, so you grab your best cookbook and get to work.
That's the idea behind O'Reilly's Linux Networking Cookbook, by Carla Schroder. Carla has gathered a group of networking recipes that a reasonably Linux-savvy reader can use to address network needs like a seasoned sysadmin. If you want to find out how to hook your Linux workstation to a LAN, get another book. If you are reasonably comfortable with Linux, need to set up an LDAP server, configure single sign-on with Samba for a mixed Linux/Windows LAN, set up a VPN, or troubleshoot network problems without some uppity online geek telling you to RTFM, this book may be what you're looking for.
One of the great strengths and weaknesses of Linux is that everything you could possibly need to know is already on your computer in the form of man pages, or out on the internet in newsgroups, forums, or a massive autumn's leaf-pile of how-tos. Finding what you need in a form that you can use is sometimes a bigger problem than the problem you're trying to solve.
The Linux Networking Cookbook improves on that situation in a couple of ways. First is the author herself. Carla is an experienced System Administrator and a good technical writer. She was one of the early Linuxchix, and has spent years mentoring and otherwise helping new and experienced Linux folk through their assorted dilemmas. The result is a friendly and direct, information-packed and ego-free writing style. Unlike the typical how-to that provides a list of steps that have worked for the author, Carla's discussions fill in the blanks and tell you why she takes the steps that she does.
The Cookbook is organized into an introduction followed by 18 chapters that are complete stand-alone solutions to specific problems.
The obligatory introduction is short and is not required by any of the solutions in the book, but it's worth reading. Its' eleven pages read quickly, but contain, among other things, a good explanation of the difference between bandwidth and latency and a decent overview of the whys and whens of linux-based computers as routers versus mid-range and high-end commercial routers.
Each chapter begins with an introduction of the overall topic, Routing with Linux, for example, followed by a series of short recipes organized as problem-solution-discussion. This format is convenient for diving right into work and takes advantage Carla's mentoring talents.
One problem facing any writer of Linux books is the sheer number of Linux distributions, many of which have their own distinct ways of doing things. The Linux Networking Cookbook provides solutions for both Debian and Fedora Linux. It's an excellent choice when you consider that most Linuxes derive from one of those two bases, including all of the *buntus, Knoppix, Mandriva, PCLinuxOS, CentOS, and many more. The recipes employ generic tools, which makes them easier to transport across distributions, even the SuSEs, which are based on neither Debian nor Red Hat.
For example, before obtaining The Cookbook, I needed to create a self-signed SSL certificate for a PostgreSQL server on an Ubuntu server. I'd done it a few times, but not enough to remember, so I went off to the net. The Ubuntu-themed How-To I found relied on a script called apache2-ssl-certificate. An apache script didn't bother me because I could move the pieces when I was done, or just break open the script and make it do what I wanted done. Ubuntu Feisty, however, had managed to leave the script out of the distribution, so I had to go back to the net to find an alternative approach.
Had I used The Cookboock, my task would have been simpler, though not quite as easy as it should be. Inexplicably for a book that includes network security and SSL-based VPNs, there is no entry for SSL Certificate in the index. A browse through the table of contents turns up a couple of recipes for Creating SSL-Keys for a Syslog-ng Server: one for Debian and one for Fedora. Fortunately, the Table of Contents is short and can be browsed completely in seconds, because those recipes are in the Troubleshooting Networks chapter, which is not intuitively obvious. They appear in that chapter because it contains the recipes for network monitoring, which includes installation of Syslog-ng.
The recipe itself is suitably generic, using the CA.sh script, which is part of openssl, and openssl itself to generate keys and certificates. A quick check of my Ubuntu servers, my Fedora VPS server, and my OpenSuSE workstation found CA.sh on all of them.
My OpenSuSE machine did throw one small curve:
CA.sh on my openSUSE box was located in/usr/lib/ssl/misc, as on the other boxes. However, the book tells us that CA.sh, and a moderatley competent Linux user is likely to know that rpm -ql openssl will list all of the files in the openssl package or that rpm-ql openssl | grep CA.sh will spit out the location of the script.
Given the variety of Linux distributions, it is hard to imagine a better approach to take.
The Glossary of Networking Terms in Appendix B deserves special mention. Each term is explained in plain but precise language that goes beyond the cursory definitions so common in glossaries. For example, the explanation for WEP notes that it is very weak protection and urges the reader to use WPA/WPA2 instead.
Sometimes, the extra information can soften a definition's focus, but, overall, the glossary is an outstanding tool for anyone who doesn't spend his or her time knee-deep in subnet definitions, routers, and tcp dumps.
The same is true of the book.
As is usual for O'Reilly, updates, errata, and scripts from the book are available on the web.
eldavojohn writes: "Painting the current scientific community as just as bad as the Spanish Inquisition, an extended trailer of Ben Stein's "Expelled" has a lot of people (at least that I know) talking. It looks like his movie plans to encourage people to speak out if they believe intelligent design or creationism to be correct. In the trailer he even warns you that if you are a scientist you may lose your job by watching "Expelled." Backlash to the movie has started popping up and this may force the creationism/evolutionist debate to a whole new level across the big screen and the internet. Is it wrong of him to question evolution?"