Article Network

BackTrack 4: Security with Penetration Testing Methodology

by Shakeel Ali Tedi Heriyanto | April 2011 | Linux Servers Open Source

Penetration Testing, sometimes abbreviated as PenTest, is a process that is followed to conduct a hardcore security assessment or audit. A methodology defines a set of rules, practices, procedures, and methods that are pursued and implemented during the course of any information security audit program with the BackTrack operating system environment. The key topics covered in this article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, include:

  • Discussion on two well-known types of penetration testing, Black-Box and White-Box
  • Exhibiting clear differences between vulnerability assessment and penetration testing
  • Explaining the industry acceptable security testing methodologies with their core functions, features, and benefits
  • The BackTrack testing methodology incorporating the ten consecutive steps of penetration testing process
  • The ethical dimension of how the security testing projects should be handled
Read BackTrack 4: Security with Penetration Testing Methodology in full

Backing Up and Restoring TYPO3 Websites

by Michael Peacock | July 2008 | MySQL Content Management Open Source PHP

All web applications and web servers have security vulnerabilities and there is every chance that our website will be compromised. Most web hosts have their own backup procedures in place, but it is not uncommon for a web host to become victim to an attack, and have problems with a small percentage of its customer backups. Because of this it is very important that we keep backups of our website. In this article by Michael Peacock, we will see how to backup our website and restore it back gain from our backup.

Read Backing Up and Restoring TYPO3 Websites in full

Background Animation

by Adam Culpepper | December 2013 | Beginner's Guides Open Source

In this article by Adam Culpepper, the author of the book jQuery 2.0 Animation Techniques Beginners Guide, has given a detailed description on how to use the animate() effect to animate the background color and learn how to animate the position of background images inside our elements.

Read Background Animation in full

Backbase Tag Library

by Ghica van Emde Boas Sergey Ilinsky | December 2009 | AJAX

In this article by Ghica van Emde Boas and Sergey Ilinsky, we will discuss about the following:

  • Backbase Tag Library widget overview
  • The BTL abstract elements
  • Styling techniques for GUI widgets
Read Backbase Tag Library in full

Backbase 4 RIA Development: Hello Backbase in four variations

by Ghica van Emde Boas Sergey Ilinsky | December 2009 | AJAX

In this article by Ghica van Emde Boas and Sergey Ilinsky, we will discuss about the famous Hello World in the following variations: with only basic JavaScript, a Backbase UI widget together with basic JavaScript, a Backbase Tag Library widget together with the Backbase XML Execution Language, and finally using AJAX communication with a server script.

Read Backbase 4 RIA Development: Hello Backbase in four variations in full

Axure RP 6 Prototyping Essentials: Advanced Interactions

by Ezra Schwartz | January 2012 | Architecture & Analysis Content Management WordPress

This article covers some advanced topics such as conditions, raised events, and so on.

In this article by Ezra Schwartz, author of Axure RP 6 Prototyping Essentials, we will cover a set of features such as raised events, conditional logic and variables, introduction to a terminology which is usually associated with programming and suggests complexity. It is understandable if you are not interested in, or are intimidated by, the prospect of coding, and wish to avoid using this set of Axure features as long as possible. You should not.

First, rest assured that no coding is involved. By now, you are familiar with Axure's Interactions and the Case Editor features, which require you only to select from a contextual selection of options and construct interactions by pointing and clicking. The only typing required is the labeling. You will find a similar easy-to-use interface when you use features such as the Condition Builder or simulate "drag and drop".

Secondly, think about some of the terminologies and methods we use in interaction design. We use branching logic to determine use cases, scenarios, and how functionality responds to user interaction under certain conditions. Axure makes it fairly easy to model the logic we need, in order to visualize branching paths, and express it in the interactive prototype.

Read Axure RP 6 Prototyping Essentials: Advanced Interactions in full

Away3D: Detecting Collisions

by Michael Ivanov | June 2011 | Open Source Web Graphics & Video

Three dimensions are better than two — and it's not a secret anymore that 3D is here to stay. Gone are the days when Flash was just used for 2D animations. In the last few years, online Flash content has undergone a revolution with the introduction of real-time 3D engines for Flash. Away3D is the big daddy of them all—which makes it the ultimate resource for top-rated 3D content development and for powering today's coolest games and Flash sites.

In this article by Michael Ivanov, author of Away3D 3.6 Cookbook, we will see how to detect collisions between objects in Away3D.

Read Away3D: Detecting Collisions in full

Away3D 3.6: Applying Light and Pixel Bender materials

by Matthew Casperson | March 2011 | Open Source Web Graphics & Video

Away3D includes a large selection of materials. There are various shading techniques that can be used by these materials, which allows for a selection of materials ranging from those that display a simple texture map to those more advanced materials, which produce more interesting detailed results like reflections, lighting, and shadowing.

In this article by Matthew Casperson, author of Away3D 3.6 Essentials, we will cover Pixel Bender, and seen how it has been used by Away3D to create some of these advanced materials. Those materials that can be lit from an external light source are listed, along with a table that breaks down the types of light sources that affect these materials. We will also see how resources, like textures, can be embedded into the final SWF, or loaded from external resources.

Read Away3D 3.6: Applying Light and Pixel Bender materials in full

Away3D 3.6: Applying Basic and Bitmap Materials

by Matthew Casperson | February 2011 | Enterprise Articles Web Graphics & Video

Away3D includes over a dozen material types that can be used to display 3D objects with a huge variety of effects, with some of the materials using the Pixel Bender technology new to Flash Player 10 to create a level of detail that has not previously been seen in Flash applications.

In the previous article by Matthew Casperson, author of Away3D 3.6 Essentials, we covered Materials, Lights and Shading Techniques with Away3D 3.6. In this article the focus will be on:

  • The different materials that can be created in Away3D
  • Illuminating materials with lights
Read Away3D 3.6: Applying Basic and Bitmap Materials in full

Away3D 3.6: Applying Animated and Composite materials

by Matthew Casperson | March 2011 | Open Source Web Graphics & Video

In this article by Matthew Casperson, author of Away3D 3.6 Essentials we will explore Animated and Composite materials. A number of materials can be used to display animations on the surface of a 3D object. These animations are usually movies that have been encoded into a SWF file. You can also display an interactive SWF file, like a form, on the surface of a 3D object. Composite materials are used to display a number of effects like shading, bump mapping, environment mapping, and lighting. The reader will comprehend this article better by referring the previous articles on:

Read Away3D 3.6: Applying Animated and Composite materials in full

Avro Source Sink

by Steve Hoffman | July 2013 | Open Source

In this article by Steve Hoffman, author of Apache Flume: Distributed Log Collection for Hadoop, we'll put Avro to use in communication between Flume agents.

Read Avro Source Sink in full

Availability Management

by Konstantin Kuminsky | October 2013 | Enterprise Articles

In this article written by Konstantin Kuminsky, the author of the book Implementing VMware vCenter Server, describes the features in vCenter that allow you to reduce downtime and make sure your services are available for end users most of the time. The features are vSphere High Availability, Fault Tolerance including host and VM monitoring, datastore heartbeating, and Dynamic Resource Scheduler (DRS).

We will discuss the different aspects of vSphere's High Availability (HA) and Fault Tolerance (FT), including host and VM monitoring, datastore heartbeating, and Distributed Resource Scheduler (DRS).

In this article we will cover the following topics:

  • Reducing planned and unplanned downtime
  • Creating a vSphere HA cluster
  • HA security, logging, and admission control
  • Preparing hosts and configuring FT
Read Availability Management in full

Autoscaling with the Windows Azure Service Management REST API

by Neil Mackenzie | August 2011 | Cookbooks Enterprise Articles Microsoft

One of the attractions of cloud computing is the financial saving gained through the elastic provision of compute services, that is, the ability to scale up and down the number of instances of a hosted service.

In this article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, we will see how the Windows Azure Service Management REST API can be used to autoscale a hosted service, so that it can handle the current and predicted load depending on the day of the week. By autoscale we mean the ability of a hosted service to scale itself elastically by modifying automatically the number of running instances.

Read Autoscaling with the Windows Azure Service Management REST API in full

Autoproxy in Spring Aspect-Oriented Programming (AOP)

by Massimiliano Dessì | February 2009 | Java Open Source Web Development

Spring allows us to use "autoproxy" bean definitions, which can automatically proxy selected bean definitions. There are three kind of autoproxies provided for automatic creation of beans. In this article by Massimiliano Dessi, we will look at this in detail.

Read Autoproxy in Spring Aspect-Oriented Programming (AOP) in full

Automation with Python and STAF/STAX

by Javier Collado | September 2008 | Open Source

The aim of this article by Javier Collado is to show how tasks may be automated using Python together with STAF (Software Testing Automation Framework) by means of an example. We will first see a problem and then derive its solution using classical Python-only as well as Python+STAF. The implementation of the solution will evolve in different stages. This will help us in comparing both the solution in terms of simplicity and efficiency.

Read Automation with Python and STAF/STAX in full

Automating Your System Administration and Deployment Tasks Over SSH

by Dr. M. O. Faruque Sarker | March 2014 | Cookbooks Networking & Telephony

In this article, by Dr. M. O. Faruque Sarker, author of Python Network Programming Cookbook, we will cover the following recipes:

  • Executing a remote shell command using telnet
  • Copying a file to a remote machine by SFTP
  • Printing a remote machine's CPU information
  • Installing a Python package remotely
  • Running a MySQL command remotely

This article promotes some interesting Python libraries. The recipes are presented aiming at the system administrators and advanced Python programmers who like to write code that connects to remote systems and executes commands. The article begins with lightweight recipes with a built-in Python library, telnetlib. It then brings Paramiko, a well-known remote access library. Finally, the powerful remote system administration library, fabric, is presented. The fabric library is loved by developers who regularly script for automatic deployments, for example, deploying web applications or building custom application binaries.

Read Automating Your System Administration and Deployment Tasks Over SSH in full

Automating the Audio Parameters – How it Works

by Chris Khoo | September 2013 | Open Source Web Development

In this article by Chris Khoo, the author of Instant Audio Processing with Web Audio, we will see how automating the audio parametes is carried out. There are several key rules in regards to scheduling the automation events:

  • If an event is added at a time when there is already an event of the exact same type, the new event replaces the old one.

  • If an event is added at a time when there is already an event of a different type, it is scheduled to occur immediately after it.

  • Events may not overlap – some events occur over time, such as the linearRampToValueAtTime() automation behavior. No events may be scheduled in the time when such events are active, otherwise Web Audio will throw a runtime exception.

Read Automating the Audio Parameters – How it Works in full

Automated testing using Robotium

by Hrushikesh Zadgaonkar | November 2013 | Open Source

Automated testing helps us to maintain high software quality and provides a facility to capture if any code changes affect the actual use case. This article by Hrushikesh Zadgaonkar, the author of Robotium Automated Testing for Android, introduces the Robotium framework, its different features, its benefits in the world of automated testing, the API set of the Robotium Framework, and how to implement the Robotium Remote Control using SAFS.

Read Automated testing using Robotium in full

Authorizing User Access to BPEL Process

by Matjaz B. Juric | October 2010 | Enterprise Articles Web Development

In the previous article, Securing a BPEL process, we saw the principles of securing BPEL processes.

In this article, by Matjaz B. Juric, author of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will look at how to secure BPEL processes, so that they can be accessed only by authenticated users. In a nutshell, we will:

  • Configure the web service export of a BPEL process to propagate user identity to the process, so that a process instance ownership can be claimed in that user's name
  • Protect a BPEL process at SCA level as a component to implement access to the process for authorized users only
Read Authorizing User Access to BPEL Process in full

Authorizations in SAP HANA

by Mark Walker | July 2013 | Enterprise Articles SAP

In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.

SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.

The authorization concept in SAP HANA is comprised of different notions:

  • Roles

  • SQL privileges

  • Analytic privileges

  • System privileges

  • Package privileges

  • Users

     

We will take a look at each of these concepts in turn.

Read Authorizations in SAP HANA in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software