This article by M.L.Srinivasan, covers concepts related to vulnerability assessment and penetration testing.
In this article, we'll focus on IT vulnerabilities, the impact due to compromise, and the overall cycle of vulnerability and penetration tests. We'll also discuss some of the emerging standards in terms of vulnerability naming systems such as Common Vulnerabilities and Exposures (CVE), which is a dictionary for vulnerability names; and Common Vulnerability Scoring System (CVSS), as defined by the National Institute of Standards and Technology (NIST).Read CISSP: Vulnerability and Penetration Testing for Access Control in full
This article by M.L.Srinivasan, covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures.
Access control, as the name implies, is the domain that deals with controlling access to information and the associated information system assets such as computers, networks, data center, etc. As with the overall objective of information security, access control is to preserve the CIA of information assets by way of administrative, technical (logical), and physical controls.Read CISSP: Security Measures for Access Control in full
This article by Tanner Ezell, author of Cisco Unified Communications Manager 8: Expert Administration Cookbook focuses on implementing local route groups, device pools, and route patterns. All the recipes in this article require administrator access to the Unified Communications Manager (UCM). It is strongly recommended you get comfortable performing these recipes in a lab environment before implementing them into production.
We will cover:
- Implementing local route groups with device pools for E.164 call routing
- Implementing E.164 route patterns and partitions
- Implementing E.164 called and calling party transformations
- Implementing least cost call routing using Tail End Hop Off
- Implementing call restrictions with line blocking patterns and calling search spaces
In this article by Robert Kent, author of Instant Magento Shipping How-to [Instant], We will see Magento comes equipped with a variety of shipping methods—most of which can be used for almost any type of online store.Read Choosing your shipping method in full
In this article written by Jose Miguel Parrella, the author of the book Instant Debian – Build a Web Server explains how Debian organizes software, the architectures, and installation methods, and indicates a set of criteria for system administrators to choose and get the right media.
The Debian Project prides itself on producing the Universal Operating System. This means that the software the project puts together runs on a broad set of hardware (architectures) for several types of purposes, and even for different kernels such as Linux, Hurd, or FreeBSD.
Choosing the right flavor of Debian for your setup might seem intimidating at first, but this recipe will provide you with decision elements to help you reduce your time to market with Debian and choose the right architecture and installation method, particularly for a web server.Read Choosing the right flavor of Debian (Simple) in full
With more than two million users worldwide, R is one of the most popular open source projects. It is a free and robust statistical programming environment with very powerful graphical capabilities. Analyzing and visualizing data with R is a necessary skill for anyone doing any kind of statistical analysis.
In this article we will cover:
- Choosing plotting point symbol styles and sizes
- Choosing line styles and width
- Choosing box styles
- How to adjust axis annotations and tick marks
- How to format log axes
- Setting graph margins and dimensions
This article by Fabrizio Volpe, author of Getting Started with Microsoft Lync Server 2013, discusses about Lync 2013 mobile clients. These clients have been made available for iPhone, iPad, Windows Phone, and Android. Audio and video over IP are available with this release of the client, and this is something we have to keep in mind when we are planning our clients' deployment because the mobile version is now a viable alternative (if not a replacement) to the full Lync 2013 client.Read Choosing Lync 2013 Clients in full
In this article by Sylvain Hellegouarch, we are going to explain how to develop a photoblog application. In the first half of this article, we will review the goals and features of this application from a high-level perspective without going into too much detail. In the second half, we will define the entities that our application will manipulate and introduce the concept of object-relational mappers, which aim at reducing the impedance mismatch between relational database and object-oriented software design. We will briefly present the most common Python ORMs and then develop our application data access layer based on the Dejavu ORM.Read CherryPy : A Photoblog Application in full
This article by Matthias Marschall author of Chef Infrastructure Automation Cookbook helps you to get started with Chef. It explains some key concepts such as cookbooks, roles, and environments and shows you how to use some basic tools such as Git, Knife, Chef Shell, Vagrant, and Berkshelf.
"What made Manhattan Manhattan was the underground infrastructure, that engineering marvel." - Andrew Cuomo
This article will cover the basics of Chef, including common terminology, workflow practices, and various tools surrounding Chef. We will explore version control using Git, walk through working with community cookbooks, and running those cookbooks on your own servers to configure them the way you need them.Read Chef Infrastructure in full
OpenStreetMap is a diverse project with hundreds of thousands of people contributing data and making use of it in different ways. As a result, many of the resources that mappers have created and use are scattered around the Internet, but the project data and much of the documentation is hosted at openstreetmap.org, on servers operated by the OpenStreetMap Foundation.
In this article by Jonathan Bennett, author of the book OpenStreetMap, we'll look at some of the following tools you can use to check OpenStreetMap data in a particular area, and what problems they can and can't tell you about:
- The data inspection tools on openstreetmap.org
- The NoName map
- ITOWorld OSM Mapper
- Geofabrik's OSM Inspector
Some of these tools identify specific problems, while others allow you to see when changes to the data were made and by whom. In either case, all these tools can do is offer guidance, not black-and-white answers, and you always need to use judgment when checking data.Read Checking OpenStreetMap Data for Problems in full
In this article by Arie Geller and Matthew Lyon, authors of the book Oracle Application Express 3.2 – The Essentials and More, we will see how to save the checked checkboxes into a database table.Read Checkbox Persistence in Tabular Forms (Reports) in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
This is the second part of the two-part tutorial by Jonathan Williamson. In this tutorial, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. To read the first part, click: Character Head Modeling in Blender: Part 1Read Character Head Modeling in Blender: Part 2 in full
In this two-part tutorial by Jonathan Williamson, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. This tutorial will take you through the whole process from setting up a background image as a reference, to laying out the topology, to tweaking the final model proportions and mesh structure.Read Character Head Modeling in Blender: Part 1 in full
Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.Read Change Control for Personal Projects - Subversion Style in full
This article by Michael Havey explains to SOA veterans how to make good use of Complex Event Processing (CEP): a technology that is perhaps unfamiliar and obscure. CEP is a large topic, but we will focus on four specific subjects:
- The nature of CEP, explained in terms of its relationship with SOA.
- Where CEP fits in the SOA stack.
- The contrasting coding styles of CEP and SOA.
- CEP-aware SOA processes.
In this article by Ajit Kumar, author of Sencha Touch Cookbook (2nd edition), we will go through all the form fields and understand how to make use of them and learn about their specific behaviors. Also, we will see how to create a form using one or more form fields, and handle form validation and submission.
In this article, we will cover the following topics:
- Getting your form ready with form panels
- Working with search
- Applying custom validation in the e-mail field
- Working with dates using the date picker
- Making a field hidden
- Working with the select field
- Changing a value using slider
- Spinning the number wheel using spinner
- Toggling between your two choices
- Checkbox and checkbox groups
- Text and text area
- Grouping fields with fieldset
- Validating your form
In the previous part of the article, we saw how to Create Categories and Add products to our store. In this part by William Rice, we will learn how to create Attributes and Attribute Sets in Magento.Read Categories and Attributes in Magento: Part 2 in full
In this article by William Rice, we will learn about Categories, Products, and Attributes in Magento.
The combination of products, presentation, and service makes our store unique. In this part, we will see how to add products to our store. Before adding products, we need to make some decisions about how we will organize our site. A few minutes of planning now can save us hours of work later.Read Categories and Attributes in Magento: Part 1 in full
As we know, DBIx::Class can provide a powerful interface to your data. Sometimes, however, DBIx::Class is not the right tool for the job. Situations often arise in which your application won't be able to access database tables directly and instead you'll need to access data through predefined stored procedures. In this case, DBIx::Class would be useless as you aren't able to read and modify objects with the usual SELECT, INSERT, UPDATE, and DELETE command set—everything must be done by calling a procedure and reading back the result. In other cases, your data won't be in a database at all. You might instead choose to store and retrieve information from files in a directory.
In this article, author Jonathan Rockway covers three common cases—mixing a procedural interface with a relational DBIx::Class interface, writing a database interface without DBIx:: Class, and building a custom Model that doesn't use a database at all.Read Catalyst Web Framework: Building Your Own Model in full