Article Network

Why Do We Need Specialist Security Distros?

by Mayank Sharma | February 2008 | Linux Servers Open Source

Many popular distributions, community-oriented and otherwise, take security very seriously. They have dedicated security teams that go over individual packages before they're rolled into a final release. To make sure you don't have any loose ends, these distributions and many other individual Open Source projects also publish an endless stream of security advisories and updates. Add to this security mechanisms like SELinux, AppArmor, and the upcoming TOMOYO Linux, and SMACK, and you know they mean business. So what room does this leave for specialist security distros?

Read Why Do We Need Specialist Security Distros? in full

Why Hudson?

by Lloyd H. Meinholz | December 2013 | Open Source

In this article by Lloyd H. Meinholz, the author of the book "Hudson 3 Essentials" has given a detailed description about Hudson 3 and its properties. Hudson is an open source Java-based web application that executes and monitors jobs. These jobs are typically builds that may produce test results and/or build artifacts. Hudson is maintained as two separate projects: the Hudson core and the Hudson plugins. Hudson core is the web application with several key plugins and is maintained by core Hudson committers. Hudson plugins provide additional functionality to Hudson and are maintained by other Hudson community members.

Read Why Hudson? in full

Why MyBatis

by K. Siva Prasad Reddy | July 2013 | Open Source

In this article written by K. Siva Prasad Reddy, who has also authored the article Java Persistence with MyBatis 3, we will understand why MyBatis is useful.

There are many Java-based persistence frameworks, however MyBatis became popular because of the following reasons:

  • It Eliminates a lot of JDBC boilerplate code
  • It has a low learning curve
  • It works well with legacy databases
  • It embraces SQL
  • It provides support for integration with Spring and Guice frameworks
  • It provides support for integration with third-party cache libraries
  • It induces better performance

 

Read Why MyBatis in full

Wijmo Widgets

by Tochi Eke-Okoro | May 2013 | Open Source Web Development

This article by Tochi Eke-Okoro, author of Instant Wijmo Widgets How-to [Instant], opens the reader to a world of aesthetic user interface widgets made available by Wijmo. It exhibits, via a step-wise approach, simple methods of creating and customizing various widgets, and how to display them including the Column Bar Chart and Bubble Chart options.

Read Wijmo Widgets in full

Windows 8 and Windows Server 2012 Modules and Cmdlets

by Adam Driscoll | September 2012 | Microsoft

Microsoft Windows PowerShell 3.0 First Look will ensure that you have a great overview of the numerous new features and changes found in the most recent version of the language. Through simple examples and succinct chapters, this book will quickly bring readers up to speed with need to know information about the newest version of PowerShell.

In this article by Adam Driscoll, author of Microsoft Windows PowerShell 3.0 First Look, we'll see:

  • A selection of new cmdlets found in the core PowerShell modules
  • A selection of new modules and cmdlets found in Windows 8 and Windows Server 2012
Read Windows 8 and Windows Server 2012 Modules and Cmdlets in full

Windows 8 with VMware View

by Prasenjit Sarkar Ramesh Geddam | September 2013 | Enterprise Articles

The article, Windows 8 with VMware View, covers the important aspects of VMware View. This article by Ramesh Geddam and Prasenjit Sarkar, authors of the book Instant VMware View Virtualization How-to , covers the deployment of VMware View on Windows 8, and also explains the steps necessary to build a virtual machine on Windows.

Read Windows 8 with VMware View in full

Windows Azure Diagnostics: Initializing the Configuration and Using a Configuration File

by Neil Mackenzie | August 2011 | Cookbooks Enterprise Articles Microsoft

The default configuration for Windows Azure Diagnostics captures some data but does not persist it. Consequently, the diagnostics configuration should be modified at role startup. In this article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, the Initializing the configuration of Windows Azure Diagnostics recipe, shows us how to do this programmatically, which is the normal way to do it. In the Using a configuration file with Windows Azure Diagnostics recipe, we see how to use a configuration file to do this, which is necessary in a VM role.

Read Windows Azure Diagnostics: Initializing the Configuration and Using a Configuration File in full

Windows Azure Mobile Services - Implementing Push Notifications using

by Geoff Webber-Cross | January 2014 | Enterprise Articles

In this article by Geoff Webber-Cross, author of the book Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8, we will have a look at how push Notifications allow us to expand our application's user experience outside the bounds of the app with live tile updates, toast notifications, and badges in Windows 8. Windows Azure Mobile Services makes it very easy for us to trigger notifications via Windows Notifications Service (WNS) (for Store apps), Microsoft Push Notification Service (MPNS) (for Windows Phone 8 apps), Apple Notifications Service (ANS), and Google Notifications Service (GCM). We're going to discuss how to configure Windows 8 and Windows Phone applications to allow notifications, send different types of notifications using scripts, and create a list of devices to manage our user's notification channels.

Read Windows Azure Mobile Services - Implementing Push Notifications using in full

Windows Azure Service Bus: Key Features

by Riccardo Becker | December 2012 | Enterprise Articles

Windows Azure Service Bus offers features that are not offered by any other cloud platform on the market. One important feature is the Service Bus that enables you to connect your on-premise services to Windows Azure services and beyond. The Access Control Service enables you to easily authenticate users without having to write complex authentication code ourselves. By using Windows Identity Framework (WIF) and supporting identity providers such as Live ID, Yahoo, and Facebook, it will be easy to use these identity providers as the main authentication mechanism in our own services.

In this article by Riccardo Becker, author of Windows Azure programming patterns for Start-ups, we will provide a systematic guide on how to integrate with Facebook. AppFabric also contains AppFabric applications, an easy way to develop and deploy composite applications. Another interesting feature is the caching feature that AppFabric offers.

Read Windows Azure Service Bus: Key Features in full

Windows Development Using Visual Studio 2008

by Stefan Björnander | July 2009 | Microsoft

The development environment of choice in this article by Stefan Björnander is the Visual Studio from Microsoft. In this article we also study the Microsoft Foundation Classes (MFC).

  • Visual Studio provides us with a few Wizards—tools that help us generate code. The Application Wizard creates an application framework (a skeleton application) to which we add the specific logic and behavior of our application.
  • When developing a Windows application, the Document/View model comes in handy. The application is divided into a document object that holds the data and performs the logic, and one or more views that take care of user input and display information on the screen.
  • When an event occurs (the user clicks the mouse, the window is resized) a message is sent to the application, it is caught by a view object and is passed on to the document object. There are hundreds of messages in the Windows system. However, we only catch those that interest us.
  • The device context can be viewed both as a canvas to paint on and as a toolbox holding pens and brushes.
  • When we finish an application, we may want it to occur in the same state when we launch it the next time. This can be archived by storing vital values in the registry.
  • Serialization is an elegant way of storing and loading values to and from a file. The framework takes care of naming, opening, and closing the file, all we have to do is to fill in the unique values of the application.
  • The cursor has different appearances on different occasions. There are several predefined cursors we can use.
Read Windows Development Using Visual Studio 2008 in full

Windows Installer XML (WiX): Adding a User Interface

by Nick Ramirez | October 2010 | Open Source

The WiX toolset ships with several User Interface wizards that are ready to use out of the box. We'll briefly discuss each of the available sets and then move on to learning how to create your own from scratch. In this article by Nick Ramirez, author of the book WiX: A Developer's Guide to Windows Installer XML, you'll learn about:

  • Adding dialogs into the InstallUISequence
  • Linking one dialog to another to form a complete wizard
  • Getting basic text and window styling working
  • Including necessary dialogs like those needed to display errors
Read Windows Installer XML (WiX): Adding a User Interface in full

Windows Phone 7 Silverlight: Location Services

by Jonathan Marbutt Robb Schiefer Jr. | September 2011 | Cookbooks Microsoft

In this article by Jonathan Marbutt and Robb Schiefer Jr., authors of Windows Phone 7 Silverlight Cookbook, we will take a deep dive into the location API for Windows Phone 7 by building an application to help navigate during travel and another to map the user's location.

In this article we will cover:

  • Tracking latitude and longitude
  • Tracking altitude, speed, and course
  • Saving battery by using a location wisely
  • Using location services with the emulator
  • Mapping your location
Read Windows Phone 7 Silverlight: Location Services in full

Windows Phone 8: Principles for UI/UX and Bindings

by Tomasz Szostak | October 2013 | Open Source

In this article by Tomasz Szostak, author of Windows Phone 8 Application Development Essentials, we will cover:

  • Principles for UI/UX
  • Bindings
Read Windows Phone 8: Principles for UI/UX and Bindings in full

Windows Presentation Foundation Project - Basics of Working

by Dr.Jay Krishnaswamy | February 2008 | .NET Microsoft

This article by Jayaram Krishnaswamy introduces the reader accustomed to working with the traditional graphic user interface in earlier versions of VB to Windows Presentation Foundation. Importantly, it introduces the reader to the XAML's declarative format and what it means in the design interface of VS 2008. WPF can do a great deal more than what is described in this article. The power of markup extensions such as declarative binding, dynamic resource, template binding and many others are not discussed. It is hoped that the reader will be up and running WPF projects based on his previous experience after reading this article.

Read Windows Presentation Foundation Project - Basics of Working in full

Wireless and Mobile Hacks

by Cameron Buchanan | July 2014 | Open Source

In this article, by Cameron Buchanan, the author of Kali Linux CTF Blueprints, we will specifically focus on the following topics:

  • Prerequisites for this article
  • Network setup
  • In-depth setup of a WEP network and dummy traffic
  • In-depth setup of a WPA-2 network for handshake capture
  • In-depth setup of vulnerable phones and devices
  • In-depth setup of a secondary vulnerable phone scenario
  • Exploit guide
Read Wireless and Mobile Hacks in full

Wireshark: Working with Packet Streams

by Abhinav Singh | March 2013 | Networking & Telephony Open Source

As you start to use Wireshark, you will realize that there are a wide variety of things that you can do with it. This article by Abhinav Singh, author of Instant Wireshark Starter [Instant], will teach you all about working with packet streams, the most commonly performed tasks and most commonly used feature in Wireshark.

Read Wireshark: Working with Packet Streams in full

WordPress 3 Security: Apache Modules

by Olly Connelly | June 2011 | Open Source WordPress

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both. What we must do is to solidify your WordPress and other logins so you can securely administrate while keeping your data and credentials flying well under the radar. We'll put the best web protocols to work, along with added defenses, chiefly from Apache.

In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:

  • IP deny with mod_access
  • Password protect directories
  • Authentication with mod_auth
  • Better passwords with mod_auth_digest
  • More authentication methods
Read WordPress 3 Security: Apache Modules in full

WordPress 3 Security: Overall Risk to Site and Server

by Olly Connelly | July 2011 | Open Source WordPress

Many local and online risks double up to threaten sites and servers as well, and in some cases the opposite is true. With our web assets though, given their constant availability and valuable prizes for the successful assailant, malicious possibilities, and the temptation to exploit those rocket our subject’s risk factor, off the chart, to a sky-high level.

In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:

  • Sizing up vulnerabilities to WordPress and its third party code
  • Addressing the frailties of and attacks to your server-side environment
Read WordPress 3 Security: Overall Risk to Site and Server in full

WordPress 3 Security: Risks and Threats

by Olly Connelly | July 2011 | Open Source WordPress

It stands to reason that we can't properly secure a WordPress site until we have a heads-up on its vulnerabilities and the threats it faces. So let's kick off by ensuring awareness.

In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we'll set the scene by introducing the hackers and their tricks and considering how the former plies the latter against a site, whether directly or indirectly:

  • Knowing the enemy, the variety of mindset, and the levels of skill
  • Considering physical security and the threat from social engineering
  • Weighing up OS security, allow vs. deny policies and open vs. closed source
  • Mulling over malware in its many shapes and forms
  • Assessing risks from local devices such as PCs and routers
  • Treading carefully in the malicious minefield that is the web
Read WordPress 3 Security: Risks and Threats in full

WordPress 3: Building a Widget

by Brian Bondari Everett Griffiths | May 2011 | Open Source WordPress

WordPress is a popular content management system (CMS), most renowned for its use as a blogging / publishing application. According to usage statistics tracker, BuiltWith (http://builtWith.com), WordPress is considered to be the most popular blogging software on the planet—not bad for something that has only been around officially since 2003.

In this article by Brian Bondari and Everett Griffiths, authors of WordPress 3 Plugin Development Essentials, we will learn about a special type of WordPress plugin: the widget. The architecture of widgets has undergone a radical change starting with the release of WordPress 2.8, so now we must talk about Object Oriented programming. We will learn a bit about its power as we extend the WP_Widget class to create our widget. We will also learn how to create a preference page in the manager so we can store our plugin's configuration details.

Read WordPress 3: Building a Widget in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software