Article Network

All | June | May | April

Customizing skin with GUISkin

by Jate Wittayabundit | July 2014 | Games

This article is written by Jate Witayabundit, the author of Unity 4 Game Development Hotshot. Those who are familiar with HTML will probably have a good understanding of using a repetitive image for a background to reduce memory usage. Unity uses the same idea to create a graphic for the user interface, which will save a lot of memory and size for our game. In this article, we will take a look at the GUISkin feature, which is the main key to creating a custom skin in Unity.

Read Customizing skin with GUISkin in full

Wireless and Mobile Hacks

by Cameron Buchanan | July 2014 | Open Source

In this article, by Cameron Buchanan, the author of Kali Linux CTF Blueprints, we will specifically focus on the following topics:

  • Prerequisites for this article
  • Network setup
  • In-depth setup of a WEP network and dummy traffic
  • In-depth setup of a WPA-2 network for handshake capture
  • In-depth setup of vulnerable phones and devices
  • In-depth setup of a secondary vulnerable phone scenario
  • Exploit guide
Read Wireless and Mobile Hacks in full

Hardware configuration

by Marco Schwartz | July 2014 | Open Source

This article by Marco Schwartz, the author of the book Arduino Home Automation Projects, explores the hardware configuration required to build wireless XBee motion detectors.

Read Hardware configuration in full

Configuration

by Aske Olsson Rasmus Voss | July 2014 | Cookbooks Open Source

In this article by Aske Olsson and Rasmus voss authors of Git Version Control Cookbook, we will cover configuration targets, querying the existing configuration, templates, a .git directory template, a few configuration examples, Git aliases, and the refspec exemplified.

Read Configuration in full

C10K – A Non-blocking Web Server in Go

by Nathan Kozyra | July 2014 | Open Source

This article by Nathan Kozyra, author of Mastering Concurrency in Go, tackles one of the Internet's most famous and esteemed challenges and attempt to solve it with core Go packages.

Read C10K – A Non-blocking Web Server in Go in full

Apache Karaf – Provisioning and Clusters

by Jean-Baptiste Onofré | July 2014 | Open Source

This article is written by Jean-Baptiste Onofré, the author of Learning Karaf Cellar. Open Software Gateway initiative (OSGi) has been "hidden" for a long time and reserved to middleware such as IDE or application servers. However, OSGi can be applied in a lot of different contexts and applications. An OSGi application needs an environment to run. Apache Karaf is a lightweight, powerful, and enterprise-ready OSGi container where you can deploy your applications. On a production system, especially a mission-critical platform, it makes sense to be able to manage a set of Apache Karaf containers and to spread the deployment (or provisioning) of applications to these different instances.

Read Apache Karaf – Provisioning and Clusters in full

HDFS and MapReduce

by Rohit Menon | July 2014 |

In this article, written by Rohit Menon, the author of the book Cloudera Administration Handbook, we will dive deeper into the two major components of Apache Hadoop—HDFS and MapReduce, and will cover the following topics:

  • Essentials of Hadoop Distributed File System

  • The read/write operational flow in HDFS

  • Exploring HDFS commands

  • Getting acquainted with MapReduce

Read HDFS and MapReduce in full

Keeping the Site Secure

by Eric Tiggeler | July 2014 | Beginner's Guides Open Source

This article by Eric Tiggeler, the author of Joomla! 3 Beginner's Guide Second Edition, will explore some simple, logical steps you can take to safeguard your site from hackers or data loss.

You've created a great site, customized its design, and added valuable content. That's an investment worth protecting. Rest assured, most Joomla sites will run for years without any hiccups. However, it's a good idea to take some precautions to minimize the risk of your website getting broken into. A few simple measures can make it a lot harder for malicious hackers to get access to your site and mess up its contents. Backing up data regularly can get you out of trouble fast if you run into hardware disasters (such as crashing hard drives) or software trouble (such as installing extensions that somehow mess up your existing site). Fortunately, these problems are rare, but it's definitely worth the little extra time investment needed to minimize risks.

How can you protect your site and how do you get your site up and running again when something has gone wrong? This article contains some essential tips and best practices to keep your site in perfect health (and save yourself some headaches too).

Read Keeping the Site Secure in full

Securing the WAL Stream

by Shaun M. Thomas | July 2014 | Cookbooks Open Source

This article is written by Shaun M. Thomas, the author of PostgreSQL 9 High Availability Cookbook. This article gives you a brief idea about securing the WAL stream.

Read Securing the WAL Stream in full

Progressive Mockito

by Sujoy Acharya | July 2014 | Open Source

In this article by Sujoy Acharya, the author of the Mastering Unit Testing Using Mockito and JUnit, book will explore the Mockito APIs, with advanced Mockito examples and the concept of behavior-driven development with Mockito. This article distills the Mockito framework to its main core and provides technical examples.

Read Progressive Mockito in full

A Virtual Machine for a Virtual World

by Wasim Ahmed | July 2014 | Networking & Telephony Open Source

This article by Wasim Ahmed, the author of the book Mastering Proxmox, covers advanced virtual machine configurations such as enabling sound, USB devices, and so on.

In this article, we are going to look at the following topics:

  • Advanced configuration options for virtual machines
  • Nested virtual environment
  • Proxmox backup/restore system
  • Virtual machine snapshots
  • Command-line backup
Read A Virtual Machine for a Virtual World in full

Module, Facts, Types and Reporting tools in Puppet

by Thomas Uphill | July 2014 | Open Source

In this article by Thomas Uphill author of Mastering puppet we deal with different aspects of Puppet and also what all changes can be made in it.

Read Module, Facts, Types and Reporting tools in Puppet in full

Introduction to Mobile Forensics

by Heather Mahalik Rohit Tamma Satish Bommisetty | July 2014 | Open Source

In this article by Satish Bommisetty, Rohit Tamma, and Heather Mahalik, the authors of the book "Practical Mobile Forensics" have introduced you to the concept of mobile forensics, core values, and its limitations. The article also provides an overview of practical approaches and best practices involved in performing mobile forensics.

Read Introduction to Mobile Forensics in full

An Introduction to Microsoft Remote Desktop Services and VDI

by Andrew Fryer | July 2014 | Enterprise Articles

This article written by Andrew Fryer, the author of the book Getting Started with Windows VDI, introduces the architecture and roles in a Microsoft VDI deployment. It shows how Hyper-V is the foundation of Microsoft's VDI architecture.

Read An Introduction to Microsoft Remote Desktop Services and VDI in full

Baking Bits with Yocto Project

by Daiane Angolini Otavio Salvador | July 2014 | Open Source

In this article by Otavio Salvador and Daiane Angolini, authors of the book Embedded Linux Development with Yocto Project, we learn about the BitBake tool and the concept of metadata.

Read Baking Bits with Yocto Project in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software