In the first part of this two-part article by Markus Feilner, we covered Installing OpenVPN on SuSE Linux, Red Hat Fedora using yum, Red Hat Enterprise Linux, and RPM-based systems.
In this part we will cover installation of OpenVPN on Debian, Ubuntu and FreeBSD. Please refer to the first part for Prerequisites.Read Installing OpenVPN on Linux and Unix Systems: Part 2 in full
This holiday season Packt brings to you attractive discounts on its ebooks. Therefore, in keeping with the festive spirit, we are pleased to announce 30% discount off all Packt eBooks. The offer doesn't end there - on purchases of two or more eBooks you will get 45% off on each eBook.The offer ends on 4th January 2010.Grab your copy NOW!Read Seasonal eBook Offer: Up to 45% off in full
Installing OpenVPN is easy and platform independent. Modern Linux systems, such as SuSE, Red Hat, Debian, or Ubuntu, provide sophisticated installation and package management systems, and still offer other ways to install the software. In this two-part article by Markus Feilner, we will install it on different Linux versions and FreeBSD.Read Installing OpenVPN on Linux and Unix Systems: Part 1 in full
Recently Ubuntu celebrated it's five-year anniversary. Ubuntu 9.10 "Karmic Koala" marks five years since the initial release, 4.10 "Warty Warthog". This article by Christer Edwards outlines some of the things Ubuntu has brought to the Linux world, and what a major impact it has had in such a short amount of time. He has been using Ubuntu nearly that entire time, having joined the fun with the 5.04 release.Read Five Years of Ubuntu in full
This article by Ahmad Seddighi discusses how Spring affects the application's data-access layer. Our discussion starts with the Data Access Object (DAO) pattern. This pattern, which is popular in the Java world, allows for a more manageable, more maintainable data-access tier. Then, we'll discuss how Spring affects application DAO classes when integrated with Hibernate.Read Integrating Spring Framework with Hibernate ORM Framework: Part 1 in full
In this article by Reynante Martinez, we will learn about photo compositing with The GIMP.Read Photo Compositing with The GIMP: Part 1 in full
This is the second part of the article series on Photo Compositing with The GIMP by Reynante Martinez. Read Photo Compositing with The GIMP: Part 1 here.Read Photo Compositing with The GIMP: Part 2 in full
In this article by Tessa Blakeley Silver, we will learn how to take your working, debugged, validated, and properly packaged WordPress theme and enhance it with dynamic menus using the SuckerFish CSS-based method and Adobe Flash media.
Here, we will learn about:
- Drop-down menus
- DIY SuckerFish menus in WordPress:
- Applying CSS to WordPress
- Applying the DOM script to WordPress
- Allowing only selected pages to display
- Hiding pages the easy way with pageMash
In this article, by Joydip Kanjilal, we will discuss entity framework for ADO.NET.
we will cover the following points:
- Creating an Entity Data Model
- Introducing the Entity Data Source Control
- Implementing our first application using the ADO.NET Entity Framework
This article by Ahmad Seddighi, introduces Spring and Hibernate, explaining what persistence is, why it is important, and how it is implemented in Java applications. It provides a theoretical discussion of Hibernate and how Hibernate solves problems related to persistence. Finally, we take a look at Spring and the role of Spring in persistence.Read An Introduction to Hibernate and Spring: Part 1 in full
In this three-part article by Magnus Mischel, we will look at some of the most common attacks that are being carried out against web applications and servers today. Knowing the anatomy of these attacks is the first step in understanding how they can be blocked, so we will first seek to understand the details of the attacks, and then see how they can be blocked using ModSecurity.Read Blocking Common Attacks using ModSecurity 2.5: Part 1 in full