The Linux.com Article Database

Once upon a time, there was a great Linux community site called Linux.com. Every day on Linux.com, dozens of volunteers from the Linux community would spend many hours of their time writing new articles, moderating comments and generally keeping the site looking like a professional resource, attracting several hundred thousand page views each day.

Unfortunately, for various reasons, Linux.com no longer exists in that format, replaced instead with a mostly automated system that pulls content from elsewhere on the web.

One of the key things that made Linux.com great, however, was that the vast majority of content on the site was published under the Open Content License. This allows for anyone to reproduce the content for free, providing the terms of the license are met.

On that basis, I've decided to re-publish (almost) all of the items that were in the main Linux.com database at the point at which it ceased to publish new content (October 2001). This includes news items and internal Linux.com announcements as well as full length articles; basically anything that was in the news/article system.

This gives the volunteers a chance to find a copy of their work, and also keeps the content available for the rest of the Linux community to benefit from and away from the bit-bucket.

Thank you to all those who contributed to the site!

If you find an item that shouldn't be here, then please let me know

If you'd like to see how Linux.com used to look, Garrett LeSage (ex linux.com art director) has some Screenshots Online as part of his portfolio


At this point you can do one of three things to find old articles:
a) Search by Author(s)
b) Use the Category Browser
or c) use the Full Text Search below.

Full Text Search

Search String:
Tick this box to search articles as well as titles


Article-o-matic

ACL's under Squid - by Brad Marshall
Squid has many ways of restricting access to, and limiting what the users can do. We will cover basic access control lists, and how these can be used from forcing requests to go through a parent proxy to restricting access to the proxy. Additionally, we will cover how to password protect the proxy, and how to implement delay pools (restricting bandwidth use). (13/Sep/1999 - 7570 bytes)
Logos