Article index by author
This is an index of all LinuxFocus articles sorted by authorname.
Aleksandar Milovac 
Alessandro Pellizzari 
Alexander Langer 
- Simple Animation
Creating a simple animation is fun and easy, for children and adults alike.
André Pascual 
Andreas J Gundacker 
- Introduction to DNS
You may have wondered what happens behind the scenes in Netscape after you enter a URL. This article will help you to understand the name-lookup process.
Angel Lopez 
This article is an introduction to multicast technologies on TCP/IP networks.
- Managing Your Mail with procmail
Keep you mail on folders, respond automatically, create mailing lists, learn how to do these and much more with procmail.
- PGP Under Linux
The author gives an introduction to PGP.
Antonio Castro 
Arnout Engelen 
Atif Ghaffar 
Baybora Baran and Seckin Gokaltun 
Ben Y. Yoshino 
- Mastering the VI editor
The VI editor is a screen-based editor used by many Unix users. The VI editor has powerful features to aid programmers, but many beginning users avoid using VI because the different features overwhelm them.
Bernard Perrot 
Bob Smith 
- Talking to a Running Process
Run Time Access is a library that lets you view the data structures in your program as tables in a PosgreSQL database or as files in a virtural file system (similar to /proc).
- A 1 Bit Data Scope
This article describes a 1bit logic analyser which samples data and sends it to a Linux PC via the rs232 port.
Brent B. Welch 
- The Tcl Syntax
This article explains basics concept and syntax of the Tcl language
Brian Hone 
Bruce Ediger 
Bruno Sousa 
Carlos Andrés Pérez 
Carlos Calzada Grau 
- RenderMan Part III
This article discusses he possibility of modeling and animating a scene using C or C!+
- RenderMan: Basics on Camera Positioning
Although the positioning is not as intuitive as Pov-Ray, it has an advantage when describing camera trajectories.
Who has not heard of Pixar? Who has not seen "Toy Story"? Pixar developed RenderMan.
Charles Vidal 
- An Introduction to Tk
This articles explain how to build a graphical interface using the Toolkit of Tcl: Tk. The reader should also appreciate the simplicity of this toolkit compared to usual X-Windows libraries.
This article reviews the possibility of MagicPoint. This software is one of the very few that allow creation of presentations under X-Windows.
- Apache : Part I
This article is an introduction to the HTTP protocol it takes also a look at the history of the World Wide Web.
- Interview with David Bagley
David Bagley is the current maintainer of xlock, a popular X Window screen saver and locking utility.
- Linux among artists at BUF COMPAGNIE
BUF Company is a major synthetic image maker in the film business.
Chianglin Ng 
Chris Dibona 
Christian Van Caillie 
- Ximian Evolution installation guide
Ximian Evolution is able to read ans send mail from a Linux workstation via an Exchange server 5. In this article, I'll give you some info about my personal experiance and my own configuration.
Christophe Blaess 
Cüneyt Göksu 
D.S. Oberoi 
Danilo Lujambo 
David Guerrero 
Detlef Müller 
- Data loss, worst case
A real-life case of data loss with a happy end, thanks to reiserfsck. Three cheers for journaling file systems and their tools.
Diego Alberto Arias Prad 
Dr. B. Thangaraju 
- Fail Safe Port Allocation for Linux Device Drivers
Writing a device driver is a challenging and an adventurous job. Once the device is registered in the driver's init_module routine, the resources for the device should be allocated. One of the main resources for the device is I/O port. The dynamically linked drivers, the developer should be careful to allocate unused range of port addresses for their device.
Edgar Hernández Zúñiga 
Egon Willighagen 
- Using BibTeXML in DocBook XML to Write Scientific Articles
BibTex is an system which enables you to insert references from a (file) database into Tex documents. In this article I will show you how you can use a BibTex like reference system with DocBook XML.
- Linux System Administration - A User's Guide (Book Review)
This is a review of the book titled "Linux System Administration - A User's Guide" by Marcel Gagne. The book has 532 pages and 26 chapters that cover installation, daemons, run-levels,file systems, password policy, kernel building, printing, devices, backups, network administration, secure computing, and more.
- Analyzing your internet applications' log files II - configuring your reports
The first article in this series introduced Lire. This article will show you how you can configure your reports for your need.
- Analyzing your internet applications' logfiles
This article is the first in a series about using Lire to analyze log files of internet server applications. This is not limited to one service, e.g. Apache, but is an integrated analyzer for many different services. Included are DNS, WWW, email and ipfilter services.
- Using XML and XSLT to build LinuxFocus.org(/Nederlands)
This article shows you how parts of the Dutch website of LinuxFocus is generated with XSLT tools from the XML database. It compares this with the (very) much slower DOM tools in Perl.
- Editing DocBook XML Documents
This article describes the use of Kate and its XML plugin as a tool for editing DocBook XML documents
- Reporting bugs on Debian 2.2
How that Debian 2.2 is released, a lot of people will upgrade to new newest Debian distro. Since Debian is extremely stable, why do you need a bug report tool? I do not know, but you cannot write software without bugs, so bugs will be found. This article explains how to submit them to the developers of the package.
- Installing Debian packages of LinuxFocus
Article on how to install the Debian package of LinuxFocus.
- An Introduction to Perl's XML::XSLT module
This article demonstrates some of the capabilities of the W3C's XSLT standard and how it can be used to help you manage and publish XML documents to the web.
- Making PDF documents with DocBook
This article describes how you can use DocBook to develop PDF documents and covers tools you need to edit DocBook articles and tools to translate them to PDF documents.
Emiliano Ariel Lesende 
Emre Demiralp 
Erdal Mutlu 
Erdal Mutlu and Ceyhun Elmas 
- Introduction to BORG
BORG is graphical user interface to BMRT, but it is not just a GUI it divides the rendering work across different computers where BMRT is used to render frames.
Eric Detoisien 
- External attacks
This article presents the different types of external attacks that a cracker can use.
Eric Seigne 
- Samba Configuration
This article describes the configuration of Linux-samba, a server needed to control domains of networks based on MS-windows machines. Examples given here are based on Debian GNU/Linux and Samba 2.0.7
- Building DHCP automatically
This article explains how to configure easily DHCP on a network.
Floris Lambrechts 
- Interview with Jeff Dike
Jeff Dike is the creator and maintainer of User Mode Linux, a very interesting new feature of the 2.6 Linux kernel. This article will give some insight into UML and the people behind it.
- Mozilla dissected
In this article we dissect the huge lizard - in particular we investigate the browser part. It's actually a review of Mozilla 1.1 with two add-ons: 'Mouse Gestures' and 'RadialContext'.
- Getting to know XML
This is a short introduction to XML. You will meet Eddy the meta cat, the XML syntax police, and some DTDs. Don't worry, we'll explain ;-)
Frédéric Navarro 
- The uCsimm kit
This article describes the uCsimm kit and the UClinux project: Porting the linux kernel on hardware without MMU (memory management unit).
Frédéric Raynal 
- Root-kit and integrity
This article presents the different operations a cracker can do after having succeeded in entering a machine. We will also discuss what an administrator can do to detect that the machine has been jeopardized.
- Security holes - Part VI
Security of CGI scripts
- Security holes - part V
This fifth article is about race conditions :what they are, how to avoid them ...
- Security holes - part IV
This fourth article deals with format strings security holes
- Security holes
This article explains how to exploit badly programmed software by using buffer overflows.
- Security Holes - part II
This second article is not directly related with the subject of the series. It reviews some concepts before describing the fear of all the system administrators:Buffer Overflows. We shall see how the memory is organized as well as the stack and how a function call is performed. Then we present a tool used for every intrusion attempt: shellcode.
- Security Holes - part I
This is the first article of a series of articles on security holes that can appear within a program. The series will show how to avoid security holes if programming habits are slightly corrected. We shall first discuss privileges, UID and EUID in this first article before dealing with the execution of external commands.
- xinetd - extended Internet services daemon
xinetd - extended Internet services daemon - provides an excellent security against the intrusions, and limit certain risks of attacks by Deny of Services ( DoS ). It allows, just like the most known pair ( inetd + tcpd ), to set access control to a computer, but its capacities extend well beyond. This article proposes you to discover them.
- Bastille Linux
Available by the beginning of june,version 1.1 of Bastille-Linux is not a new Linux Distribution but a set of security scripts. The authors have adopted a very pedagogic approach and one can learn a lot simply installing these scripts.
- Network File System (NFS)
Network File System (NFS) is a tool to manage files spread among several computers on a network as if they were on the same local machine. So, the final user does not have to worry of the exact location of its own files in order to access them.
- Yellow Pages (Part III)
In this last article about NIS, we explain how to install a NIS server. We will see which programs are used, configuration files and the building of the database.
- Yellow Pages (Part II)
My previous article was an introduction to the yellow pages and RPCs. This one explains how to configure a NIS client, how this client works and a small introduction to the different tools coming with NIS. Finally, we'll have a few words about NIS+
- Yellow Pages
The Network Information Service (NIS) manages a data base on server. Each computer on a network running a NIS client NIS can then poll the server for informations (login name,password, users and groups informations, ...).
- Automount and autofs
Automount and autofs are powerful tools and ease file systems management.
Geoffrey W. Corey 
Enlightenment is a highly customizable window manager for Linux. This article discusses the features, installation, and customization of the Enlightenment window manager.
Georges Tarbouriech 
- A GNUstep small apps tour
This is a very short review of some of the smaller but very useful tools from GNUstep.
- GWorkspace, the GNUstep Workspace Manager
The concept of Workspace Manager appeared with NeXT at the end of the 80's. It was a complete new way of using a system GUI. GWorkspace is the GNUstep free implementation of this revolution.
- Free Unix : the BSD one(s)
This aricle takes a look at the species "BSD UNIX".
- Gorm and ProjectCenter, the GNUstep RAD tools
Gorm and ProjectCenter are the Gnu Rapid Application Development tools for GNUstep
- FreeBSD, another alternative
This article is an overview over another free Unix system: FreeBSD
- How to secure an heterogeneous network with free tools
Security in computers networks is probably one of the biggest technology challenges of the 21st century. This article provides a general overview over the most important aspects.
- GNUMail.app, the portability evidence
A NeXTmail clone able to run under GNUstep and MacOS X with the same source code
- IOS, another REBOLution
Back to the future: IOS the internet operating system
- MySQL and Perl, the marriage of convenience
Using MySQL in conjunction with Perl is an old story, but still a good one.
- Nessus : another brick in the (security) wall
Nessus is more than a single security scanner
- Psionic Portsentry 1.1, the defender of the ports
Port scan detection and active defense
- Singing in the web... with Opera 5.0 for Linux
Review of the new improved version of one of the lightest browsers
- Through the tunnel
Using free SSH with external applications on different OSes
- GNUstep, the open source OpenStep
An object-oriented framework
- Security tools
Free tools to harden your systems
- Once upon a time... or commercial Unix vs free Unix
Why choosing between a commercial or a free Unix
- REBOL the rebel
Let's say REBOL is a messaging language, but as a matter of fact, it's much more than that.
- Virtual Network Computing
The dream of the network administrator come true
- Arkeia, a professional and commercial network backup solution
Arkeia 4.2.3-1 is the latest version of a commercial and professional network backup solution from Knox Software.
- NEdit, the universal editor in Unix world
Nedit is a remarkable editor. Unfortunately it is not included in most Linux distributions and therefore not as well known as other editors.
- WindowMaker the spirit of NextStep
Window Maker 0.61.1 is the latest release of a NeXT look-alike window manager.
- FSViewer, a File Manager for WindowMaker
Among the revolutionary tools of NeXTStep, the first in order of appearance on the screen was indisputably the File Viewer. Thanks to the path-view in that File Manager you always knew where you were. It was more than a manager, it was a true browser. FSViewer is a NeXTStep a like File Manager for WindowMaker.
Gerrit Renker 
Guido Socher 
Hack Linux 
Harald Radke 
Heinz-Josef Claes 
Hilaire Fernandes 
Holger Blasum 
Ingo Hoffmann 
Ismael Ripoll 
- Interview with Juan Jose Amor
Juan Jose Amor Iglesias Current coordinator of the LuCAS project, part of the LDP and devoted to the translation and localization of MDL manuals in Spanish
- Real-Time Linux II
In this second issue devoted to RT-Linux I will try to offer a more practical view of RT-Linux.
- The StarOffice Suite
This article looks at the word processor in StarOffice
- Real-Time Linux
Basic Concepts of Real-Time.
- StarOffice for Linux
This article reviews the applications available in the suite StarOffice 4.0. The author gives us a demonstration using tool for the creation of presentations. (functionally similar to Microsoft's Power Point).
- Lyx Review
Lyx is an editor with fantastic possibilities. Ismael gives us a little overview.
Ismael Rpoll and Elisa Acosta 
- Linux RT, part III
In this article a simple electric circuit is used to process commands from any infra-red remote control.
Jan Alonzo 
Jan Svenungson 
Javi Polo 
- TCPD and Firewalls using IPFWADM
This article describes very briefly how to configure the inetd services in order to improve security on your system. We concentrate in the of the tool IPFWADM to administer and configure inetd services
Javier Palacios Bermejo 
Examples on how to use AWK
Jay Link 
Jean-Etienne Poirrier 
Jeffry Degrande 
- Slackware 7.0 part II: Configuration Guide
After the installation in the first part, the author now describes some basic configuration tasks in his now favorite Linux distribution. He explains how to configure X, how to compile a kernel (and how to use it with lilo), how to do user account management, how to dial in to internet and how to give your system some basic security.
- Slackware 7.0 part I: Installation Guide
The author describes in detail the installation of the Slackware 7.0 Linux distribution. This article is written for beginners.
Joel McCarty 
John E. Gotts 
John Kirch 
- Microsoft Windows NT Server 4.0 versus UNIX
The goal of this article is provide managers in corporations with the data and comparisons necessary to make well-informed decisions concerning the installation of servers for the corporate environment. All the information presented in this article summarizes the experience of a number of information systems professionals.
John Perr 
Jonas Alvarez 
Jose M. Fernandez 
- Java. Part II
The second part of a tutorial about java
- MySQL. A Database Server
MySQL is an SQL (Structured Query Language) database server supported by a number of platforms, including Linux. Its Linux version is design with fast performance in mind.
- Programming with Java. Part I
This is the first article in a series about Java programming. The first part will describe Java as a language, its general characteristics and the location of the most relevant sources of information.
Jose Maria Laveda 
Josef Schwarz 
José Salvador González Rivera 
Juan Manuel Sepúlveda 
Juan Manuel Triana,Carlos Andres Perez 
Jürgen Pohl 
- Statistics Anyone?
Most statistics packages seem to be overwhelming in their scope, forcing the user on a very steep learning path, most of them are also very expensive. There is however a refreshing alternative: SalStat
Katja Socher 
Katja and Guido Socher 
Ken Yap 
Klaus Mueller 
Lamarque Eric 
Lee Wee Tiong 
Leonardo Giordani 
Linda Christie 
Lorne Bailey 
- KDE 3
The new KDE3 is out. This article will give you an idea what it would be like to try it for yourself.
- GCC - the root of all
This is an introduction to using gcc as a compiler.
Luca Bariani 
Luis Colorado 
Majid Hameed 
A Knoppix based Live CD that provides a Linux Cluster ready for MPI and other Parallel Computing in less than 15 minutes!
Manuel Benet Navarro 
Manuel Martinez 
Manuel Muriel Cordero 
- GNU utilities
The GNU utilities are a set of standard UNIX commands available with almost every UNIX system.
- Basic UNIX commands
Simple introduction to some of the basic UNIX tools
Manuel Soriano 
Manuel Trujillo Albarral 
- Some Tips
Well...here are some notes, tricks, some of these are specific to non-english speaking users and therefore not frequently answered in the common documentation.
- Connecting to the Internet
Here we have something lots of users face up to in their early stages of setting Linux up: Connecting to the Internet.
Mario M. Knopf 
Checkinstall is utility to automatically build RPM/Debian/Slackware packages from tar.gz source pages. This makes it possible to do a "clean" installation and de-installation of almost any source code tar.gz package.
LF tip: Customize motd & isse
LinuxFocus tip number 2 for November 2004
- darkstat - a network traffic analyser
In this article we present the network traffic analyzer "darkstat". We cover installation, start and usage of this program.
vsftpd - an introduction to the Very Secure FTP Daemon
This article gives a basic introduction to the "Very Secure FTP Daemon". I am beginning with a general description of FTP and vsftpd. After that we will have a look at the installation, configuration and start options of the vsftp daemon.
Mark Nielsen 
Martin Van Velsen 
- MindsEye: 3D Modeling
About 2 years ago, when linux was still very much a hackers operating system, the idea popped up to start work on a renderer/modeler/animation program for Linux.
Matthias Rechenburg 
Michael Jastremski 
Michael Tschater 
Miguel A Sepulveda 
Mooneer Salem 
Mulyadi Santosa 
Nico Golde 
Nicolas Bouliane 
- Writing your own netfilter match
The iptables/netfilter framework gives us the possibility to add features. To do so, we write kernel modules that registers against this framework.
Olivier Chapuis 
- How to remove windows
This article describes how to remove Windows and give the disk space to Linux without re-installing it
Omar Andres Armas Aleman 
- Interview with Miguel de Icaza
Miguel de Icaza gives us an interesting peek at a selected group of linux kernel developers. He is involved with the Linux/Sparc, Gnome project and RedHat's Lab.
Ozcan Gungor 
Penelope Marr 
Phil Ross 
Philip de Groot 
- Compile your own Linux kernel
This a really comprehensive article that teaches you how to download , configure, compile and install your own kernel.
- Real-time mp3 recording, part II
In the first part we showed how you can record in mp3 in realtime, for example a radio show, and make a big file out of it, e.g. 650MB for 24 hours of music in near-CD quality (128 kbit/s; stereo). Now, what to do with such a big file? Can we make even bigger files, or could we maybe get a better compression rate? How about the quality of these mp3 recordings?
- Real-time MP3 recording
Recording music in mp3-format gives you the possibility to record very long pieces of music without exhausting the disk-space.
Phillip Gühring 
Pierre Loidreau 
Ralf Wieland 
Razmal Djamal 
Reha K. Gerceker 
- Introduction to Ncurses
Ncurses is a library that provides function-key mapping, screen painting functions and the ability to use multiple non-overlapping windows on text-based terminals.
S. Parthasarath 
Sandeep Grover 
Sascha Blum 
Sebastian Bauer 
Sebastian Sasias 
Serge Lozovsky 
Serge Winitzki 
Stefan Blechschmidt 
Subhasish Ghosh 
Sujan M. Swearingen 
Thomas Mangin 
Tjabo Kloppenburg 
Tom Uijldert 
Vincent Renardias 
Vincente Egea 
- Installation and Configuration of a Raid-system
RAID (Redundant Array of Inexpensive Disks) consists of a series of systems to organize several disk drives into a single entity that behaves as a single virtual drive but making the various disks work in parallel thus improving the access performance and saving the information stored from accidental crashes.
- An auto guided Vehicle Based on Linux
This ariticle describes a Linux based robot as developed at the Universidad Politecnica de Valencia
Wang Xu 
- Wireless LAN under Linux
In this article, the author talks about driver installation and usage of some common Wireless LAN adapters and related issues such as authentication based on 802.1x methods.
Wilbert Berendsen 
- Make it anywhere with make!
This article explains how "make" works. It shows that "make" is more than just a command to compile software.
Yao Feng 
Yves Ceccone