[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Edlug Archive Apr 2004 ]

[edlug] O'Reilly UG News - Issue 05/06-04

O'Reilly UK User Group Programme
Issue 05/06-04
It seems that my last newsletter 05-04 never reached all the addressees, I have therefore combined 05 & 06. My apologies to those we got 05 in the previous attempt.


	-	Perl evening, London
	-	Would you like to arrange a security talk?

- Books for review
- Coming soon

***Perl Evening - London, City University, April 29th
An evening of Perl talks, chosen to give a broad overview of the   
language and demonstrate how Perl can be useful for you. 

Perl is a stable, cross platform programming language used for 
mission critical projects in the public and private sectors. 
It is Open Source software and is supported across a wide variety 
of operating systems from Unix, Macintosh, Windows and many more. 
Perl is one of the few most popular web programming languages due 
to its text manipulation capabilities and rapid development cycle. 

Dave Cross will give a summary of Perl's strengths, the resources 
available for Perl programmers, and the history of the language. 

Mark Fowler will be describing the best of the CPAN, covering the 
plethora of free Perl modules available. 

Andy Wardley's talk will concentrate on one very powerful use of 
Perl - template processing. 

Then Simon Cozens will look ahead at Perl's future to what's 
coming with Perl 6. 

And there will be ample opportunities for continued discussion.
You must register in advanced - <http://www.lonix.org.uk/tnet-cgi/Lonix?CODE=showRegisterDetails&SEMINAR=TRUE&MEETINGID=64>

***Would you like to arrange a security talk?
O'Reilly UK author, Chris McNab, is available to talk about network security for any platform.
See information on his book - <http://www.oreilly.com/catalog/networksa/> 
And various articles for O'Reilly Networks - 
'Top Ten Tips to Make Attackers Lives Hell <http://www.oreillynet.com/pub/a/security/2004/03/25/ntwksecurityassess.html> 
The Journey from Poacher to Gamekeeper <http://www.oreillynet.com/pub/a/oreilly/security/news/2004/03/08/netsec.html> 

Please let me know if you wish to have Chris as a speaker at one of your meetings.

Spread the word to your members....

General News
***Happy Hacking! 
Mike Langberg writes, "Most of us look at a toaster and see a kitchen appliance for crisping bread. Scott Fullam looks at a toaster and sees an engineering challenge...," in this "Mercury News" book review of  "Hardware Hacking Projects for Geeks."

***The Uganda Digital Bookmobile
Inspired by his experience on the road with the Internet Bookmobile, Richard Koman, along with Brad deGraf, founded Anywhere Books, an organization dedicated to deploying the bookmobile approach in development contexts. In turn, Koman and deGraf partnered with the National Library of Uganda to create the Uganda Digital Bookmobile. Koman writes about his experience in Uganda with this project, which included the set up of scanning stations and a printing system at the National Library in Kampala.

***Resizing an Image with Photoshop
Learn how to modify image size, when to resample, and how to handle resolution issues from Photoshop expert Deke McClelland. We've included a sample video file so you can get a taste of the hands-on video tutorials that are an integral part of Deke's recently released "Adobe Photoshop CS One-on-One."

***What's New in Photoshop CS? 
Photoshop CS may have fewer new features than version 7, but quality counts more than quantity, and Ken Milburn is pretty jazzed about the quality. In this article, he covers the new features in CS he's most excited about. Ken is the author of "Digital Photography: Expert Techniques"

***400 O'Reilly Books on Safari
O'Reilly now boasts more than 400 books on Safari, the premier electronic reference library for IT professionals and programmers. We're proud to have such a strong presence on Safari, where we share company with the industry's leading technical publishers in bringing readers time-saving access to the information they need. If you are not yet a Safari convert, give the service a try with a free trial subscription:

Open Source
***Things Squid Administrators Should Know New users often struggle with the same frustrating set of idiosyncrasies involved in learning Squid, the popular web caching software. Here are six things you should know about using Squid from the get-go, from Duane
Wessels, creator of Squid and author of "Squid: The Definitive Guide."

***A Ticketing System for a Three-Tiered Architecture 
Modern business apps often use a three-tiered architecture, separating the user interface from the data store from the application logic. Of course, this separation can add wait time, as users wait for their requests to process. Elena Garderman and Howard Feldman explain how adding a ticketing system can improve the process.

***Amazon and Open Source
Amazon realized early on that amazon.com was more than just a book site, more in fact than just an e-commerce site. It was becoming an e-commerce platform. Open source has been a key part of the Amazon story, and although Amazon has closed code, it has created its own "architecture of participation" that may be even richer than that of many open source software development communities. Tim shares his thoughts in the latest Ask Tim. 

***Mod_python's PSP: Python Server Pages
For simple web sites, inlining code in the pages themselves is shockingly effective. For more complex sites, it can even work with good MVC design. Fear not, Pythonistas, mod_python's PSP brings the power and clarity of Python to web programming. Grisha Trubetskoy explains.

***Day in the Life of #Apache
Rich Bowen tackles yet another common Apache dilemma in the latest installment in this series based on his conversations on the IRC channel, #apache. This week he delves into the sometimes confusing world of modules: when to enable them, when to disable them, and why.

***Top Ten Tips to Make AttackersâEUR(tm) Lives Hell 
Chris McNab breaks down his top ten tips all network administrators should follow to protect their networks from opportunistic threats and make it hard for the more determined attackers to get anywhere. Chris is the author of the recently released "Network Security Assessment."

***Eleven Metrics to Monitor for a Happy and Healthy Squid 
Duane Wessels offers 11 tips to help you stay on top of Squid's performance. If you follow this advice, you should be able to discover problems before your users begin calling you to complain. Duane is the creator of Squid and the author of "Squid: The Definitive Guide."

***Home Automation with Mac OS X, Part 1 
Having more control over how your home operates isn't just a geek fantasy. You can lower energy costs, improve security, and enhance the overall ambiance of your humble abode. Alan Graham shows you how to leverage your Mac OS X computer and get started.

***Automated Backups with Existing Tools 
Backing up your hard disc is the job nobody wants to do--and even more so, no one wants to spend a lot of money doing it. Fortunately, Apple gives you everything you need in Mac OS X. You just have to pull it together. Peter Hickman shows you how.

***Cleaning iPhoto
When you have thousands of images in iPhoto and don't have time to cull them manually, scripting starts to look very appealing. brian d foy shows you some helpful AppleScripts and Perl scripts you can use to clean up your iPhoto libraries.

***bash on Mac OS X
In the migration from Jaguar to Panther, one of the lesser-discussed changes has been the switch from tcsh to bash as the default shell (for new accounts). In this article, David Miller delves into affected areas, such as aliases and environment variables, to help you make the transition.

***You Sexy Thing!
Just about everyone looks great behind a cursor, but the days of communicating online exclusively with text are numbered. So Snaggy and Nitrozac offer their brand of advice on how to look great on iChat AV, in spite of iSight. With tips on proper lighting, camera angles, and using the right foundation, Snaggy and Nitrozac offer more of the high-tech humor you've come to know and love in their comic and in their book, "The Best of The Joy of Tech."

***Creating Online Help with Tinderbox 
Apple's online help system, Apple Help, has a dubious reputation among some Mac users, mainly because of poky performance. But Panther has improved the situation. Matt Neuburg built an online help system for a Mac application using a note-taking hypertext outliner called Tinderbox. He explains the process in this article.

***Protect Yourself Against Denial-of-Service Attacks 
The only way to defend yourself is to understand your attacker in-depth. This excerpt from the recently released "Security Warrior" by Cyrus Peikari and Anton Chuvakin details denial-of-service attacks against Windows XP. Read it and prepare yourself.

***Inside IIS 6
With the release of Windows Server 2003, Microsoft has made significant changes in how IIS works. Mitch Tulloch brings you up to speed on what's new, and gives you insider tips on how to take advantage of it.

***Protect Yourself Against Kerberos Attacks
The only way to defend yourself is to understand your attacker in-depth. This excerpt from the recently released "Security Warrior" by Cyrus Peikari and Anton Chuvakin details Kerberos attacks. Read it and prepare yourself.

***Windows Server Hacks: Resetting User Passwords 
Resetting user passwords from the command line can save you time, but there are "gotchas" along the way. Mitch Tulloch, author of "Windows Server Hacks," shows you what to watch out for and how to reset passwords fast.

***Kill Internet Ads with HOSTS and PAC Files 
You don't need special software to kill ads and objectionable Internet content--just use the power built right into the Windows browser.

***Power Up Internet Explorer with Three Shells
Supercharge Internet Explorer with one of these three wrappers, and you won't be able to imagine how you got along without them. 
For all the latest Windows tips and tricks visit:

***Book Preview: Eclipse
The new Eclipse Foundation was recently announced at EclipseCon, and the Eclipse project is moving toward a June release of Eclipse 3.0. O'Reilly will publish Steve Holzner's "Eclipse: A Java Developer's Guide" this summer.
A beta preview of Chapter 5, "Building Eclipse Projects Using Ant," is
available online:

***Six Cool New JSP and Servlet Features
Bruce Perry describes six cool new features that Java developers who use Tomcat 5.x and other Servlet-API-2.4- and JSP-2.0-compliant containers will want to use in their projects. Bruce is the author of "Java Servlet  & JSP Cookbook."

***Configuring JBoss 4.0 JDBC Connectivity
JBoss uses the HypersonicDB by default, but with a few configuration changes, it can use any JDBC-equipped database. Deepak Vohra shows how to use Oracle, Sybase, MySQL and other databases with JBoss.

***Java and Sound, Part 1 
Where can you learn how to play simple audio clips with the java.applet.AudioClip class, as well as how to use the javax.sound.sampled and javax.sound.midi packages to do such things as load and play sound clips, and monitor and change the playback position within a clip? In these first excerpts in a two-part series of excerpts from Chapter 17 ("Sound") of "Java Examples in a Nutshell, 3rd Edition."

***Bug Prevention with Code Generation: A J2EE Case Study 
If you had to drill 12,000 holes, would you prefer a manual drill, or its automated equivalent? Francesco Aliverti-Piuri describes using code generation for discovering bugs in a J2EE example.

***The Ideal Digital Photographer's Workflow, Part 3
You can achieve greater control over the quality of the images produced by your new digital camera if you shoot them in RAW format. Trouble is, it can take an inordinate amount of time to convert RAW images into something your image-editing program can use. In Part 3 of Ken Milburn's series on creating ideal digital photography workflows, he details several steps you can take to save hours of RAW-process work after every shoot. Ken is the author of the upcoming "Digital Photography: Expert Techniques."

***ADO.NET Connection Pooling Explained
Because the .NET managed providers manage the connection pool for us, using shared database connections is as easy as a summertime splash in the kiddie pool. But if those connections unexpectedly become invalid you could find yourself floundering in the deep end. In this new article, James Still will have you doing laps in no time.

***Cooking with C# 
Learn how to convert a string returned as a Byte[ ] back into a string and how to handle an exception that occurs within a method invoked via reflection in these sample recipes from O'Reilly's recently released  "C# Cookbook."

***O'Reilly Learning Lab's .NET Certificate Series
Learn .NET programming skills and earn a .NET Programming Certificate from the University of Illinois Office of Continuing Education. The .NET Certificate Series is comprised of three courses that give you the foundation you need to do .NET programming well. The courses are: Learn XML; Learn Object-Oriented Programming Using Java; and Learn C#. Enroll now in all three courses and save over $500.

***Developing Web-Service-Driven, Smart Mobile Applications
Working with web services and other network protocols that were designed with broadband in mind can become a real burden to making applications really mobile. But there is hope. Michael Yaun walks through the design and implementation of a complete end-to-end mobile application that solves these difficult problems.

***Create Project Item Wizards
In a recent project, Niel Bornstein and his team had to produce a platform that included a set of base classes that other developers could use to develop Windows forms in Visual Studio .NET 2003. As the team worked on the base classes, it became clear that the developers would be able to crank out their forms a lot faster if they could also generate stubs and skeleton code for all the methods they needed to override in their own classes. Niel explains how to do it in this article.

***O'Reilly Learning Lab's .NET Certificate Series
Learn .NET programming skills and earn a .NET Programming Certificate from the University of Illinois Office of Continuing Education. The .NET Certificate Series is comprised of three courses that give you the foundation you need to do .NET programming well. The courses are: Learn XML; Learn Object-Oriented Programming Using Java; and Learn C#. Limited time offer: Enroll in all three courses and save $895.


****Latest books available for review

Review copies are available please send me your request  josette@xxx.xxx.xxx 
For quick delivery, please include your postal address - since I work often from home and do not have access to the database.

***Adobe Photoshop CS One-on-One
Beginners who want to learn Adobe Photoshop will welcome this unique and authoritative book. To simulate a classroom environment, Photoshop expert Deke McClelland includes over two hours of video training on CD to accompany the book's written instruction. The two methods work together to present a wealth of information in an easily approachable style. - <http://www.oreilly.com/catalog/adobephoto/>

***Access Cookbook, 2nd Edition
Access power users and programmers at all levels will rely on the Access Cookbook, Second Edition for quick solutions to gnarly problems. Fully updated for Access 2003, it's also one of the first books to thoroughly explore new support for .NET managed code and XML. All of the examples have been tested for compatibility with Access 2003, Windows XP, and Windows Server 2003. This new edition also covers Access with SharePoint, SmartTags, .NET; and XML.

***Cascading Style Sheets: The Definitive Guide, 2nd Edition
Cascading Style Sheets: The Definitive Guide, 2nd Edition is a thorough review of all aspects of CSS2.1 and a comprehensive guide to CSS implementation. The book includes new content on positioning, lists and generated content, table layout, user interface, paged media, and more. It explores in detail each individual CSS property and how it interacts with other properties, and shows how to avoid common mistakes in interpretation.

***Dancing Barefoot 
Wil Wheaton--blogger <http://www.wilwheaton.net>, geek, and Star Trek: The Next Generation's Wesley Crusher--gives us five true tales of life, love, and the absurdities of Hollywood in Dancing Barefoot. Far from the usual celebrity tell-all, Dancing Barefoot is a vivid, personal account of Wil's search for his true self. If you've ever fallen in love, attended a Star Trek convention, or pondered the meaning of life, you'll find a kindred soul in the pages of Dancing Barefoot. <http://www.oreilly.com/catalog/barefoot/> 

***Digital Photography: Expert Techniques
Serious photographers, including professionals, who want to take advantage of the unique creative powers available through digital photography and digital image processing, including Photoshop CS, will find this problem-solving book invaluable. Rather than a general discussion of photography principles, Digital Photography: Expert Techniques focuses on workflow: time-tested, step-by-step procedures based on hard-nosed experience by and for genuine practitioners of the art.

***Dreamweaver MX 2004: The Missing Manual
Dreamweaver MX 2004: The Missing Manual enables both first-time and experienced web designers to bring stunning, interactive web sites to life. What sets this new edition apart is the crystal-clear writing, welcome humor, and exclusive features. With over 500 illustrations, a handcrafted index, and the clarity of thought that has made bestsellers of every Missing Manual to date, this new edition is the ultimate atlas for Dreamweaver MX 2004. <http://www.oreilly.com/catalog/dreammx2004tmm/>

***Excel Hacks
The tips and tools in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language. This resourceful, roll-up-your-sleeves guide shows you new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks increases productivity with Excel and gives you hours of "hacking" enjoyment along the way.

***Hardcore Java
Hardcore Java takes this language and breaks it apart, piece by piece, revealing the important secrets and tricks that will take you from a junior-level programmer to a seasoned and expert developer. You'll fly through the fundamentals and quickly find yourself learning about advanced memory management techniques, optimization and bytecode-level enhancements, and the techniques required to build lightning-fast GUIs. Throughout the book, you'll also master the art of writing and maintaining bulletproof and error-proof code, all while grasping the intricacies of the Java language.

***Hardware Hacking Projects for Geeks
>From building an Internet toaster to creating a cubicle intrusion detection system, Hardware Hacking Projects for Geeks offers an array of inventive, customized electronics projects for the geek who can't help looking at a gadget and wondering how it might be "upgraded." Beginning with basic hacks, tools, and techniques for those who may not have a background in electronics, the book covers the tools of the hardware hacking trade and basic soldering techniques, then moves into more advanced hacking projects. Clear step-by-step instructions allow even those with no formal electronics- or hardware-engineering skills to hack real hardware in very clever ways.

***IPod & iTunes: The Missing Manual, 2nd Edition
In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. With humor and authority, she lays bare an astonishing collection of useful tips, tricks, and shortcuts, and covers all iPod models for both Mac and Windows, including the iPod Mini. iPod & iTunes: The Missing Manual is also the ultimate guide to the iTunes software, MusicMatch Jukebox, and the new iTunes Music Store for both Mac and Windows. 

***Linux Pocket Guide
Linux Pocket Guide gets you up to speed quickly on day-to-day Linux use. The book begins with general concepts like files and directories, the shell, and X windows, and then presents detailed overviews of the most essential commands. You'll learn each command's purpose, usage, options, location on disk, and even the RPM package that installed it. Throw in a host of valuable power user tips and a friendly, accessible style, and you'll find this practical, to-the-point book a small but mighty resource for Linux users.

***Mac OS X Panther for Unix Geeks
If you find yourself disoriented by the new Mac® environment, Mac OS X Panther for Unix Geeks will get you acclimated quickly to the foreign new areas of a familiar Unix® landscape. The new edition of this book is your guide to figuring out the BSD Unix system and Panther-specific components that you may find challenging. The book includes a quick manpage-style reference to the "Missing Manual Pages" --commands that come with Mac OS X Panther, although there are no manpages.

***Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts.

***Oracle Essentials, 3rd Edition
This new edition distills a vast amount of knowledge into an easy-to-read volume covering the full range of Oracle's features and technologies. The book includes an overview of Oracle 10g, along with recent releases 9i and 8i. Oracle Essentials, 3rd Edition: Oracle Database 10g provides everything you'll need to install and run the Oracle databases. If you're new to Oracle or upgrading to Oracle 10g, you'll find this comprehensive guide essential.

qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book fills crucial gaps in existing documentation, detailing exactly what the core qmail software does.

***Squid: The Definitive Guide
Squid is the most popular Web caching software in use today, and it works on a variety of platforms including Linux, FreeBSD, and Windows. Written by Duane Wessels, the creator of Squid, Squid: The Definitive Guide will help you configure and tune Squid for your particular situation. Newcomers to Squid will learn how to download, compile, and install code. Seasoned users of Squid will be interested in the later chapters, which tackle advanced topics such as high-performance storage options, rewriting requests, HTTP server acceleration, monitoring, debugging, and troubleshooting Squid. <http://www.oreilly.com/catalog/squid/> 

***SQL Pocket Guide
This unique reference can be a major help to programmers who use SQL in their day-to-day work. Not just an endless collection of syntax diagrams, this small guide addresses the language's complexity head on and leads by example. The book covers the three most commonly used database products: Oracle, IBM's DB2, and Microsoft's SQL Server. It's a concise reference to frequently used SQL statements and commonly used SQL functions.

***WebLogic: The Definitive Guide
WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Exhaustive treatment of the WebLogic server and management console answers any question that readers might think to ask. From building, packaging, and deploying applications, to optimizing the runtime WebLogic environment, dealing with security issues, and understanding Enterprise APIs, this book covers everything developers, administrators, and system architects must understand to work with this powerful and complex application server. <http://www.oreilly.com/catalog/weblogictdg/>

****Coming Soon

Eclipse - <http://www.oreilly.com/catalog/eclipse/> 
High Performance MySQL - <http://www.oreilly.com/catalog/hpmysql/> 
JavaServer Faces - <http://www.oreilly.com/catalog/jsvrfaces/> 
Linux Unwired - <http://www.oreilly.com/catalog/lnxunwired/> 
Network Security Hacks - <http://www.oreilly.com/catalog/netsechacks/> 
Oracle PL/SQL Pocket Reference, 3rd Edition - <http://www.oreilly.com/catalog/orplpr3/> 
Windows Server Hacks - <http://www.oreilly.com/catalog/winsvrhks/> 
Word Pocket Guide, 2nd Edition - <http://www.oreilly.com/catalog/wordpg2/> 


London pm reviewed - 
***Practical mod-perl 
http://london.pm.org/reviews/practical_mod_perl.html <http://london.pm.org/reviews/ia_for_www_2ed.html> 

Birmingham pm reviewed -
***Perl Template Toolkit

***Secure Coding: Principles & Practices

***Learning UML

***Perl Debugger (Pocket Reference)

ACCU Spring Conference 2004, Randolph Hotel, Oxford - 14-15th April
Speakers include O'Reilly authors - Dave Asher, Alex Martelli, Eric Raymond and Andy Robinson. 
- C++ <http://www.accu.org/conference/highlights.html>
- Java <http://www.accu.org/conference/highlights.html>
 - Process <http://www.accu.org/conference/highlights.html>
 - Open Source Forum <http://www.accu.org/conference/opensource.html>
- UK Python Conference <http://www.accu.org/conference/python.html>

To register - <https://www.accu.org/conference/reg.html> 

Kindest regards

The information contained in this e-mail message and any attachments is
intended for the addressee only and may be confidential. If you are not
the addressee, you must not read, use, pass on or copy this message or any
attachments or disclose its contents to anyone. If you have received this
e-mail in error, please notify us by returning the e-mail and delete all
copies of this message including any attachments. E-mails cannot be
guaranteed to be secure or error free as information could be intercepted,
corrupted, lost, destroyed, arrive late or incomplete or contain viruses.
The sender does not accept any liability for any errors or omissions in
the contents of this message, which arise as a result of e-mail transmission. 
If verification is required please request a hard copy version. Thank you.

You can find the EdLUG mailing list FAQ list at:

This archive is kept by wibble@morpheux.org.DONTSPAMME