Understanding Memory usage in GNOME

This article was first written in January 2004 for
the BeezNest technical website (http://glasnost.beeznest.org/articles/99)
This has been originally written by Miguel de Icaza (the famous GNOME hacker and creator of Ximian). This was retrieved from: http://mail.gnome.org/archives/gnome-list/1999-September/msg00036.html. People usually look at the memory sizes for the processes and misinterpret the information.

Mozilla

This article was first written in December 2003 for
the BeezNest technical website (http://glasnost.beeznest.org/articles/97)
Mozilla is the all-in-one open source Internet application suite. It features, among others:
  • a web browser: Mozilla Navigator,
  • a MUA: Mozilla Mail,
  • an HTML editor: Mozilla Composer,
  • a calendar manager: Mozilla Calendar
and is the engine of most other open source high-end web browsers available, on many platforms. It is derived from

Why adding . to the PATH on UNIX is BAD ?

This article was first written in December 2003 for
the BeezNest technical website (http://glasnost.beeznest.org/articles/96)
Some UNIX administrators find it handy to add «.» in the PATH (and some even put it at the beginning of the PATH). Why is this bad? On UNIX, everything is made so that you don't have to do it. Anything not doing so can be considered buggy, and can be fixed easily. Imagine someone has access to write a file in a otherwise harmless directory, like /tmp for example. Image now that that someone wants to do harm.

PHP

"PHP (recursive acronym for "PHP: Hypertext Preprocessor") is a widely-used Open Source general-purpose scripting language that is especially suited for Web development and can be embedded into HTML." See www.php.net. Using PHP is a matter of precision. ASP can be used to reach the same objectives but ASP has proven to us to be less interesting (see some of the reasons below, one of them being the licensing scheme).

Netfilter - iptables on Debian

To create and save iptables rules the default Debian way, this is the way to go:
  • create your rules using the CLI [1] iptables
  • save them on the active rule by issuing a /etc/init.d/iptables save active
  • create the rules for the inactive state (when booting, for example) and save them accordingly
That way, the rules will survive a reboot. To delete a specific rule previously saved as above:
  • go into /var/lib/iptables/active and take the

IDS - Intrusion Detection Systems

An IDS is a system to track any changes not planned to a system. It is often used on sensitive machines where any unauthorized access is purely prohibited but can also act as a fool-proof system, more like a monitoring system. It works by checksumming or understanding the format of each file, and scrutinizing any suspect change to files.