Article Network

Installing OpenVPN on Linux and Unix Systems: Part 1

by Markus Feilner | December 2009 | Linux Servers Networking & Telephony Open Source

Installing OpenVPN is easy and platform independent. Modern Linux systems, such as SuSE, Red Hat, Debian, or Ubuntu, provide sophisticated installation and package management systems, and still offer other ways to install the software. In this two-part article by Markus Feilner, we will install it on different Linux versions and FreeBSD.

Read Installing OpenVPN on Linux and Unix Systems: Part 1 in full

Five Years of Ubuntu

by Christer Edwards | November 2009 | Linux Servers

Recently Ubuntu celebrated it's five-year anniversary. Ubuntu 9.10 "Karmic Koala" marks five years since the initial release, 4.10 "Warty Warthog". This article by Christer Edwards outlines some of the things Ubuntu has brought to the Linux world, and what a major impact it has had in such a short amount of time. He has been using Ubuntu nearly that entire time, having joined the fun with the 5.04 release.

Read Five Years of Ubuntu in full

Integrating Spring Framework with Hibernate ORM Framework: Part 1

by Ahmad Seddighi | November 2009 | Java Open Source

This article by Ahmad Seddighi discusses how Spring affects the application's data-access layer. Our discussion starts with the Data Access Object (DAO) pattern. This pattern, which is popular in the Java world, allows for a more manageable, more maintainable data-access tier. Then, we'll discuss how Spring affects application DAO classes when integrated with Hibernate.

Read Integrating Spring Framework with Hibernate ORM Framework: Part 1 in full

Photo Compositing with The GIMP: Part 1

by Reynante Martinez | November 2009 | Open Source Web Development

In this article by Reynante Martinez, we will learn about photo compositing with The GIMP.

Read Photo Compositing with The GIMP: Part 1 in full

Photo Compositing with The GIMP: Part 2

by Reynante Martinez | November 2009 | Open Source Web Graphics & Video

This is the second part of the article series on Photo Compositing with The GIMP by Reynante Martinez. Read Photo Compositing with The GIMP: Part 1 here.

Read Photo Compositing with The GIMP: Part 2 in full

Dynamic Menus in WordPress

by Tessa Blakeley Silver | November 2009 | Content Management WordPress

In this article by Tessa Blakeley Silver, we will learn how to take your working, debugged, validated, and properly packaged WordPress theme and enhance it with dynamic menus using the SuckerFish CSS-based method and Adobe Flash media.

Here, we will learn about:

  1. Drop-down menus
  2. DIY SuckerFish menus in WordPress:
    • Applying CSS to WordPress
    • Applying the DOM script to WordPress
    • Allowing only selected pages to display
    • Hiding pages the easy way with pageMash
Read Dynamic Menus in WordPress in full

ADO.NET Entity Framework

by Joydip Kanjilal | November 2009 | .NET Microsoft

In this article, by Joydip Kanjilal, we will discuss entity framework for ADO.NET.

we will cover the following points:

  • Creating an Entity Data Model
  • Introducing the Entity Data Source Control
  • Implementing our first application using the ADO.NET Entity Framework
Read ADO.NET Entity Framework in full

An Introduction to Hibernate and Spring: Part 1

by Ahmad Seddighi | November 2009 | Java Open Source

This article by Ahmad Seddighi, introduces Spring and Hibernate, explaining what persistence is, why it is important, and how it is implemented in Java applications. It provides a theoretical discussion of Hibernate and how Hibernate solves problems related to persistence. Finally, we take a look at Spring and the role of Spring in persistence.

Read An Introduction to Hibernate and Spring: Part 1 in full

Blocking Common Attacks using ModSecurity 2.5: Part 1

by Magnus Mischel | November 2009 | Linux Servers Open Source

In this three-part article by Magnus Mischel, we will look at some of the most common attacks that are being carried out against web applications and servers today. Knowing the anatomy of these attacks is the first step in understanding how they can be blocked, so we will first seek to understand the details of the attacks, and then see how they can be blocked using ModSecurity.

Read Blocking Common Attacks using ModSecurity 2.5: Part 1 in full

Creating a Text Logo in Blender

by | November 2009 | Open Source Web Graphics & Video

In this tutorial by Jonathan Williamson, we are going to examine the process behind creating a text-based logo in Blender. We will be looking at some modeling techniques mixed with several modifiers to create a background for the logo, and then we will move on to creating the actual text. Following that we will set up the lighting and render settings to produce our final image.

Read Creating a Text Logo in Blender in full

Writing XML data to the File System with SSIS

by Jayaram Krishnaswamy | November 2009 | Microsoft

This article by Dr. Jayaram Krishnaswamy, shows how you may retrieve XML data from a relational database and write it to a folder on your file system as a text or xml file using Microsoft SQL Server Integration Services 2008. The following are the different steps involved in this EL process (there being no transformation):

  • Creating a stored procedure that retrieves XML
  • Creating a package in BIDS or Visual Studio 2008
  • Adding and configuring a ExecuteSQL task
  • Adding and configuring a Script task
  • Running the package and verifying the results
Read Writing XML data to the File System with SSIS in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software