Linux DevCenter    
 Published on Linux DevCenter (
 See this if you're having trouble printing code examples

Linux Newsletter Monthly Summary

by The O'Reilly Network Editors
Linux Newsletter for 02/12/2003

Dear Reader,

In case you missed them the first time around, here are four great articles from the Linux DevCenter in the past month.

Migrating from a proprietary to a free Unix has its advantages. Speed, stability, cost, and convenience make Linux and the BSDs appealing. Unfortunately, sometimes you have an application without source and without a free counterpart. That's where binary compatibility comes in. NetBSD's Emmanuel Dreyfus is behind the Darwin and Mach binary compatibility layer, which allows running Mac OS X binaries on NetBSD. ORN interviewed him about the project, the hopes for making migrations a little easier, and a similar projects in Linux space. Read more in Emmanuel Dreyfus Interview.

Howard Wen's been looking at the state of games in Linux lately. He first found Falcon's Eye: A Graphical Makeover for Nethack. Not content to leave it there, he followed up by interviewing Jaakko Peltonen, the game's creator. Find out how Peltonen pulled off cross-platform compatibility while retaining the essential flavor of the venerable Nethack.

To subscribe to the Linux newsletter (or any O'Reilly Network newsletters), visit and select the newsletters you wish to receive in your user profile (you'll need to log in with your existing O'Reilly Network account -- if you don't yet have an account, you'll need to create one).

To change your newsletter subscription options, please visit and click the"Manage My Newsletters" link. For assistance, send email to

Spam's been getting worse this year, but there's hope. A recent paper on the statistical analysis of e-mails popularized a spam identification technique called Bayesian filtering. Of course, you don't have to be a statistician to clean up your inbox. Oktay Altunergil explains how to run a simple Bayesian filter with the impressive Sylpheed-claws mail client. Read more in Bayesian Filtering with bogofilter and Sylpheed-claws.

One of the weaknesses of the setuid model is that applications usually only need a few privileges. Having the power to do more than they need gives malicious users the opportunity for mischief. There's a movement afoot on the BSD side of the house to limit the damage with a nifty utility called systrace. Michael Lucas explains how security is made easier in Systrace Policies. (A Linux port may be found at Systrace for Linux.)

See you next month!

The O'Reilly Network Editors

Return to the list of Linux Newsletters.

Return to the Linux DevCenter.

Copyright © 2009 O'Reilly Media, Inc.