Three dimensions are better than two — and it's not a secret anymore that 3D is here to stay. Gone are the days when Flash was just used for 2D animations. In the last few years, online Flash content has undergone a revolution with the introduction of real-time 3D engines for Flash. Away3D is the big daddy of them all—which makes it the ultimate resource for top-rated 3D content development and for powering today's coolest games and Flash sites.
In this article by Michael Ivanov, author of Away3D 3.6 Cookbook, we will see how to detect collisions between objects in Away3D.Read Away3D: Detecting Collisions in full
This article covers some advanced topics such as conditions, raised events, and so on.
In this article by Ezra Schwartz, author of Axure RP 6 Prototyping Essentials, we will cover a set of features such as raised events, conditional logic and variables, introduction to a terminology which is usually associated with programming and suggests complexity. It is understandable if you are not interested in, or are intimidated by, the prospect of coding, and wish to avoid using this set of Axure features as long as possible. You should not.
First, rest assured that no coding is involved. By now, you are familiar with Axure's Interactions and the Case Editor features, which require you only to select from a contextual selection of options and construct interactions by pointing and clicking. The only typing required is the labeling. You will find a similar easy-to-use interface when you use features such as the Condition Builder or simulate "drag and drop".
Secondly, think about some of the terminologies and methods we use in interaction design. We use branching logic to determine use cases, scenarios, and how functionality responds to user interaction under certain conditions. Axure makes it fairly easy to model the logic we need, in order to visualize branching paths, and express it in the interactive prototype.Read Axure RP 6 Prototyping Essentials: Advanced Interactions in full
In this article by Ghica van Emde Boas and Sergey Ilinsky, we will discuss about the following:
- Backbase Tag Library widget overview
- The BTL abstract elements
- Styling techniques for GUI widgets
All web applications and web servers have security vulnerabilities and there is every chance that our website will be compromised. Most web hosts have their own backup procedures in place, but it is not uncommon for a web host to become victim to an attack, and have problems with a small percentage of its customer backups. Because of this it is very important that we keep backups of our website. In this article by Michael Peacock, we will see how to backup our website and restore it back gain from our backup.Read Backing Up and Restoring TYPO3 Websites in full
Penetration Testing, sometimes abbreviated as PenTest, is a process that is followed to conduct a hardcore security assessment or audit. A methodology defines a set of rules, practices, procedures, and methods that are pursued and implemented during the course of any information security audit program with the BackTrack operating system environment. The key topics covered in this article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, include:
- Discussion on two well-known types of penetration testing, Black-Box and White-Box
- Exhibiting clear differences between vulnerability assessment and penetration testing
- Explaining the industry acceptable security testing methodologies with their core functions, features, and benefits
- The BackTrack testing methodology incorporating the ten consecutive steps of penetration testing process
- The ethical dimension of how the security testing projects should be handled
This article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, covers a scope process to provide necessary guidelines on formalizing the test requirements. A scope process will introduce and describe each factor that builds a practical roadmap towards test execution. This process integrates several key elements, such as gathering client requirements, preparing a test plan, profiling test boundaries, defining business objectives, and project management and scheduling. You will learn to acquire and manage the information about the target's test environment.Read BackTrack 4: Target Scoping in full
Wireless Networks have become ubiquitous in today's world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.
In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will look at how we can conduct advanced attacks. We will primarily focus on Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base to conduct more sophisticated attacks such as Eavesdropping and Session Hijacking.
We will cover the following:
- Man-in-the-Middle attack
- Wireless Eavesdropping using MITM
- Session Hijacking using MITM
In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will focus on attacking the client. Most people exclude the client from their list when they think about WLAN security. This article will prove beyond doubt why the client is just as important as the access point when penetrating testing a WLAN network. The client can be either a connected or isolated un-associated client. We will look at various attacks, which can be used to target the client.
We will cover the following:
- Honeypot and Mis-Association attacks
- Caffe Latte attack
- De-Authenticaton and Dis-Association attacks
- Hirte attack
- AP-less WPA-Personal cracking
Computer forensics involves using various means to analyze, report, and recover information from computers or digital storage media, generally for legal purposes. The outcome in general is to provide the information gathered in such a way that it is useful for the person requesting the information. This includes the recovery of passwords, analyzing computer break-ins or attempts, recovering data from a hard drive after it's been "erased", and so on. In the article by Willie Pritchett and David De Smet authors of BackTrack 5 Cookbook we will examine how BackTrack can be utilized for forensic purposes.
In this article, we will cover:
Intrusion detection and log analysis
Recursive directory encryption/decryption
Scanning for signs of rootkits
Recovering data from a problematic source
Retrieving a Windows password
Resetting a Windows password
Looking at the Windows registry entries
In this article by Simon Riggs, author of PostgreSQL 9 Administration Cookbook, we will cover the following:
- Understanding and controlling crash recovery
- Planning backups
- Hot logical backup of one database
- Hot logical backup of all databases
- Hot logical backup of all tables in a tablespace
- Backup of database object definitions
- Standalone hot physical database backup
- Hot physical backup & Continuous Archiving
Exchanging information in the form of short messages is becoming more and more important, so frameworks for doing this will be a key factor in software development. Messages and information can be exchanged at exponential speed with JBoss HornetQ asynchronous messaging middleware.
In this article by Piero Giacomelli, author of HornetQ Messaging Developer’s Guide, we will cover the following topics::
- Installing Eclipse and NetBeans for developing with HornetQ on both Windows and Ubuntu
- Setting up a development environment for working with HornetQ core API in Eclipse and NetBeans
- Creating an example for producing and consuming messages in HornetQ in both a synchronous and an asynchronous way
- Implementing some classes using the performance practice for managing core API connections, sessions, and clients
In this article by Peter Svensson, we will have a look at Dijit or Dojo Widget which is an instance of a Dojo class that lives in the page and usually has a DOM node associated with it. Examples are FloatingPane, Tree, NumberSpinner, and ValidationtextBox.
The basic premise of a Dijit is that you should be able to create any number of widgets of the same type on the same page, regardless of where on the page you choose to put them. Certain Dijits have special requirements, naturally, such as the Layout Containers, which assume that they are surrounding ContentPane Dijits.
In general, Dijits are very versatile and much time has been spent to assure portability and modularization of the Dijit system. Best of all, this is accessible to you as a developer as well.Read Basic Dijit Knowledge in Dojo in full
In this article by Joachim Ziebs, author of AfterShot Pro: Non-destructive photo editing and management , we will perform some basic editing:
Conversion to black and white
In India, being a Manager is highly valued. A majority of people see themselves taking a managerial position some day. However, can anyone become a manager? A really good manager? Are managers born or made? Do all managers, at least all good managers, share something in common?
When we look around and see the journeys being taken by different managers, their working styles and behaviors, we can hypothesize that:
- Managers are born and made. Some folks have a natural flair to be a manager and some acquire essential skills to be a manager in a given situation.
- Not everyone may enjoy being a manager. While you may be 'promoted' to become a manager, you may find that you don't really enjoy the time spent talking to people, driving them to results, and compiling status reports for your management.
- It appears that good managers do have many things in common, even though they may have their own style of execution.
In this article by Rahul Goyal author of Management in India: Grow from an Accidental to a Successful Manager in the IT & Knowledge Industry , we will explore the skills, traits, talents, and competencies that are usually required and expected for playing a manager role, and also burst some myths surrounding managers.Read Basic Skills, Traits, and Competencies of a Manager in full
In this article by Alex Libby, the author of the book, Instant HTML5 Local Storage How-to, we will discuss about HTML5 Local Storage.
When using HTML5 Local Storage, there are two types that you can use—local storage and session storage. We'll begin by looking at the former first, using a simple form as the basis for our article.Read Basic use of Local Storage in full
More specifically, we'll cover the following:
- Issues with combining scripts
The BatteryMonitor application allows you to monitor the state and battery levels of your iOS device using the APIs that come with the iOS SDK. Each iOS device represents a unique set of properties that include the device's current physical orientation, its model name, and its battery state. It also provides access to the onboard hardware.
This article by Steven F Daniel, author of iPad Enterprise Application Development BluePrints, we will be taking a closer look at how we can use the Core Graphics framework to create and draw a gauge that will be use to present and visualize the total amount of battery life remaining on the iOS device, and then start to design the user interface for our app.Read BatteryMonitor Application in full