From DesktopLinux.com: “IBM has published a final draft of its “Redbook” titled Linux Client Migration Cookbook, Version 2: A Practical Planning and Implementation Guide for Migrating to Desktop Linux. The 376-page book, which targets enterprises needing to begin an evaluation of desktop Linux, is available for free download. “
Archive | LAMP
Linux Apache MySQL Python Perl PostgreSQL
Ohio LinuxFest
Linux.com has an article on an upcoming Ohio LinuxFest put on by their own corporation. There's a lot to be learned by reading what others have learned in putting on a conference…
Linux and open source software users in the Buckeye State who want to network with several hundred of their colleagues will get the chance when Ohio LinuxFest 2006 gets underway later this month. The one-day conference, to be held on Saturday, September 30, at the Greater Columbus Convention Center in downtown Columbus, features presentations, exhibits, an after-conference party, and a special appearance by some live penguins.
Python Reads SourceSafe
Picking up an example presented in 1998 for using COM Automation on SourceSafe from Visual FoxPro, I created the same example in Python with just as little code. Using Mark Hammond's Win32All to supply the Win32 and COM support, the following code will list all the files in a particular SourceSafe project and their version numbers.
import win32com.client
SSafe=win32com.client.Dispatch("SourceSafe")
SSafe.Open("c:\Projects\VSSPath\srcsafe.ini","troche","secret")
Root=SSafe.VSSItem("$/MyClient/MyProject")
VSSItems=Root.Items
print VSSItems.Count
for loNode in VSSItems:
print loNode.Name, loNode.VersionNumber
Subversion new version, SourceSafe conversion
OSNews reports Subversion 1.4.0 Released. “This is a feature release of Subversion [Updated link], featuring BDB 4.4 and repository auto-recovery support, a new tool for synchronizing repositories (svnsync), major speed enhancements in the versioned filesystem and the working copy, and of course the usual host of bugfixes and minor enhancements. Additionally, check this article on how to Set up Subversion and websvn on Debian.”
Good timing! I've been using subversion for the past year on a web development project with another (remote) developer, and have enjoyed the power and flexibility of the tool, as well as some of the cool add-ons, clients and scriptability.
Now, it's time to consider moving existing projects out of Visual SourceSafe and into subversion. The folks at Pumacode offer an vss2svn tool that runs as a native Windows executable, written in Perl and C, with the source available under an open license. Pumacode tried an interesting tactic to convert the VSS repositories: rather than interogate the VSS binary to retrieve files, it reads the repository files directly and interprets the results from there. There are some advantages where older versions might be corrupted, or to retrieve files flagged as deleted, which they say VSS will not allow.
On a 2 Ghz Pentium-M with a gig of RAM, it took about 2 hours to process my current VSS repository, which consists of forty thousand files and around 1.4 Gb of disk space. (The authors of vss2svn caution that it's better to convert the entire repository than to risk further corruption by pruning it first; leave that task to subversion post conversion.) This generated a dump file of 850+ Mb. Transferring that to the Linux box with a new repository took a few minutes, and loading the data about 20 minutes. Using RapidSVN from the Windows box, I was able to browse the subversion repository and confirm that files and folders and log history comments look about right. I'll confirm by checking out projects of interest and diff'ing them against the current development copies.
I had anticipated a different tack, using COM Automation to drive VSS, as I described in Essential SourceSafe. As a learning project, I had proposed using Python to browse the repository via COM Automation and use the excellent Python-svn bindings to migrate portions of a VSS repository to subversion. I still plan to try that, and to compare-and-contrast the results between the two techniques, while I learn a little more Python.
MythTV links
SlashDot misses the mark completely with in inaccurately-titled and summarized pointer to a great Tom’s Hardware story on MythTV. There’s nearly nothing in the story about the Microsoft media device, nor does there have to be. The MM is a plug-in-and-work device that locks you into their choices, their protocols and few extensions. MythTV is for the do-it-yourself tinkerer who wants to do lots more. This one’s been on my to-do list for way too long.
The comments on the Slashdot article are much more worthwhile than the post. Set your threshhold high and you’ll see the moderated posts. A pointer to Jarod Wilson’s installation guide was worth the browsing. Jarod integrates the great documentation on the MythTV site with his own experiences.
BFD Brute Force Detection vs. script kiddies
Tired of the abuse I'm getting on one of the servers exposed to the Internet, I've installed APF, the Advanced Policy Firewall, and BFD, Brute Force Detection on the machine. Webhostgear.com has easy-to-follow installation instructions for APF and BFD respectively.
While plain vanilla iptables was enough to protect the machine from most routine attacks, incessant attempts at logging in to a couple of well-known services on well-known ports was filling the logs and consuming an extrodinary amount of the bandwidth. Now, a script kiddie attempting 13,000 logins will find the machine no longer responding on that IP address.
Interesting technology. BFD uses a script run as a timed job to parse logs, pick up repeats, and bans them by scriping a command line and submitting it to APF. APF also uses the excellent DShield.org list of known problemmatic machines and networks. Very cool. While BFD comes with a set of scripts to parse common exploits, it didn't have one for my ftp server. I'm not sure I've grokked what's needed to set up my own script of rules, but as I couldn't find one on Google, I'll give it a shot, and share my results back to the community once I've got it working.
DLSLUG, September 7th: Joomla! and AJAX
Bill McGonigle announces two great presentations for the September meeting of the Dartmouth-Lake Sunapee Linux Users Group: Joomla! and AJAX. Should be a great show.
And, remember, be careful out there!
I pointed out the article on NX Server on Ed Leafe's ProFox list, and member Tracy Pearson pointed to a great article on Informit.com on Mitigating the Security Risks of SSH. Remember, just because you sprinkle the magic pixie dust of ssh on a solution, it is not necessarily secure. Security is still a process, not a feature.
Desktop Linux Survey results posted
Linux-Watch.com reports on their totally non-scientific Desktop Linux Survey results analyzed. I was surprised by the results
Hands-on night at PySIG
Speaking of Python, it's the fourth Thursday of the month, and that means that the Python Special Interest Group of the Greater New Hampshire Linux User Group meets tonight at 7 PM at the Amoskeag Business Incubator, Commercial Street, Manchester. Bill Sconce, the PySIG leader, announces that tonight is “Hands-on Night.” Should be fun. Hope to see you there!