Article Network

Basic Concepts

by Krishna Kumar | October 2013 | Open Source

This article by Krishna Kumar, the author of book Learning Physics Modeling with PhysX, provides an overview of the concepts that we use in PhysX. It will familiarize you with terms such as scene, actor, material, shape, and so on.

The topics covered in this article are as follows:

  • Initializing PhysX and creating the scene and actors
  • Creating shapes and materials and then assigning them to actors
  • Simulating and then shutting down PhysX
Read Basic Concepts in full

Basic Coding with HornetQ: Creating and Consuming Messages

by Piero Giacomelli | November 2012 | JBoss Java Open Source

Exchanging information in the form of short messages is becoming more and more important, so frameworks for doing this will be a key factor in software development. Messages and information can be exchanged at exponential speed with JBoss HornetQ asynchronous messaging middleware.

In this article by Piero Giacomelli, author of HornetQ Messaging Developer’s Guide, we will cover the following topics::

  • Installing Eclipse and NetBeans for developing with HornetQ on both Windows and Ubuntu
  • Setting up a development environment for working with HornetQ core API in Eclipse and NetBeans
  • Creating an example for producing and consuming messages in HornetQ in both a synchronous and an asynchronous way
  • Implementing some classes using the performance practice for managing core API connections, sessions, and clients
Read Basic Coding with HornetQ: Creating and Consuming Messages in full

Bar Reports in Zabbix 1.8

by Rihards Olups | April 2010 | Networking & Telephony

In this article by Rihards Olups, author of Zabbix 1.8 Network Monitoring, we will discuss the heavily configurable bar reports in detail.

Read Bar Reports in Zabbix 1.8 in full

Baking Bits with Yocto Project

by Daiane Angolini Otavio Salvador | July 2014 | Open Source

In this article by Otavio Salvador and Daiane Angolini, authors of the book Embedded Linux Development with Yocto Project, we learn about the BitBake tool and the concept of metadata.

Read Baking Bits with Yocto Project in full

Backup in PostgreSQL 9

by Simon Riggs | October 2010 | Open Source

In this article by Simon Riggs, author of PostgreSQL 9 Administration Cookbook, we will cover the following:

  • Understanding and controlling crash recovery
  • Planning backups
  • Hot logical backup of one database
  • Hot logical backup of all databases
  • Hot logical backup of all tables in a tablespace
  • Backup of database object definitions
  • Standalone hot physical database backup
  • Hot physical backup & Continuous Archiving
Read Backup in PostgreSQL 9 in full

Backup and Restore Improvements

by Gethyn Ellis | April 2014 | Enterprise Articles

The lines between on-premise and public cloud services have become blurred. The integration between on-premise and off-premise technologies imply that you can now easily implement a backup solution that makes use of both, thus allowing you to maintain up-to-date backups both on-site and off-site. This will allow you to implement a disaster recovery plan that meets strict service-level agreements without having to invest in a Disaster Recovery (DR) site. The DR site can be in the cloud. Depending on your environment, this can significantly reduce the cost of implementing a fully blown disaster recovery site or server room.

There are several new features in SQL Server 2014 that make this possible; they are as follows:

  • Backup to URL

  • Backup to Microsoft Azure

  • Encryption

In this article by Gethyn Ellis, the author of Getting Started with SQL Server 2014 Administration, you will look at how you can make use of the new features and integrate them into your backup and recovery plans to ensure that you maintain up-to-date off-site backups.

Read Backup and Restore Improvements in full

BackTrack Forensics

by David De Smet Willie L. Pritchett | March 2013 | Cookbooks Networking & Telephony Open Source

Computer forensics involves using various means to analyze, report, and recover information from computers or digital storage media, generally for legal purposes. The outcome in general is to provide the information gathered in such a way that it is useful for the person requesting the information. This includes the recovery of passwords, analyzing computer break-ins or attempts, recovering data from a hard drive after it's been "erased", and so on. In the article by Willie Pritchett and David De Smet authors of BackTrack 5 Cookbook we will examine how BackTrack can be utilized for forensic purposes.

In this article, we will cover:

  • Intrusion detection and log analysis

  • Recursive directory encryption/decryption

  • Scanning for signs of rootkits

  • Recovering data from a problematic source

  • Retrieving a Windows password

  • Resetting a Windows password

  • Looking at the Windows registry entries

Read BackTrack Forensics in full

BackTrack 5: Attacking the Client

by Vivek Ramachandran | September 2011 | Beginner's Guides Open Source

In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will focus on attacking the client. Most people exclude the client from their list when they think about WLAN security. This article will prove beyond doubt why the client is just as important as the access point when penetrating testing a WLAN network. The client can be either a connected or isolated un-associated client. We will look at various attacks, which can be used to target the client.

We will cover the following:

  • Honeypot and Mis-Association attacks
  • Caffe Latte attack
  • De-Authenticaton and Dis-Association attacks
  • Hirte attack
  • AP-less WPA-Personal cracking
Read BackTrack 5: Attacking the Client in full

BackTrack 5: Advanced WLAN Attacks

by Vivek Ramachandran | September 2011 | Linux Servers Open Source

Wireless Networks have become ubiquitous in today's world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.

In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will look at how we can conduct advanced attacks. We will primarily focus on Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base to conduct more sophisticated attacks such as Eavesdropping and Session Hijacking.

We will cover the following:

  • Man-in-the-Middle attack
  • Wireless Eavesdropping using MITM
  • Session Hijacking using MITM
Read BackTrack 5: Advanced WLAN Attacks in full

BackTrack 4: Target Scoping

by Shakeel Ali Tedi Heriyanto | April 2011 | Linux Servers Open Source

This article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, covers a scope process to provide necessary guidelines on formalizing the test requirements. A scope process will introduce and describe each factor that builds a practical roadmap towards test execution. This process integrates several key elements, such as gathering client requirements, preparing a test plan, profiling test boundaries, defining business objectives, and project management and scheduling. You will learn to acquire and manage the information about the target's test environment.

Read BackTrack 4: Target Scoping in full

BackTrack 4: Security with Penetration Testing Methodology

by Shakeel Ali Tedi Heriyanto | April 2011 | Linux Servers Open Source

Penetration Testing, sometimes abbreviated as PenTest, is a process that is followed to conduct a hardcore security assessment or audit. A methodology defines a set of rules, practices, procedures, and methods that are pursued and implemented during the course of any information security audit program with the BackTrack operating system environment. The key topics covered in this article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, include:

  • Discussion on two well-known types of penetration testing, Black-Box and White-Box
  • Exhibiting clear differences between vulnerability assessment and penetration testing
  • Explaining the industry acceptable security testing methodologies with their core functions, features, and benefits
  • The BackTrack testing methodology incorporating the ten consecutive steps of penetration testing process
  • The ethical dimension of how the security testing projects should be handled
Read BackTrack 4: Security with Penetration Testing Methodology in full

Backing Up and Restoring TYPO3 Websites

by Michael Peacock | July 2008 | MySQL Content Management Open Source PHP

All web applications and web servers have security vulnerabilities and there is every chance that our website will be compromised. Most web hosts have their own backup procedures in place, but it is not uncommon for a web host to become victim to an attack, and have problems with a small percentage of its customer backups. Because of this it is very important that we keep backups of our website. In this article by Michael Peacock, we will see how to backup our website and restore it back gain from our backup.

Read Backing Up and Restoring TYPO3 Websites in full

Background Animation

by Adam Culpepper | December 2013 | Beginner's Guides Open Source

In this article by Adam Culpepper, the author of the book jQuery 2.0 Animation Techniques Beginners Guide, has given a detailed description on how to use the animate() effect to animate the background color and learn how to animate the position of background images inside our elements.

Read Background Animation in full

Backbase Tag Library

by Ghica van Emde Boas Sergey Ilinsky | December 2009 | AJAX

In this article by Ghica van Emde Boas and Sergey Ilinsky, we will discuss about the following:

  • Backbase Tag Library widget overview
  • The BTL abstract elements
  • Styling techniques for GUI widgets
Read Backbase Tag Library in full

Backbase 4 RIA Development: Hello Backbase in four variations

by Ghica van Emde Boas Sergey Ilinsky | December 2009 | AJAX

In this article by Ghica van Emde Boas and Sergey Ilinsky, we will discuss about the famous Hello World in the following variations: with only basic JavaScript, a Backbase UI widget together with basic JavaScript, a Backbase Tag Library widget together with the Backbase XML Execution Language, and finally using AJAX communication with a server script.

Read Backbase 4 RIA Development: Hello Backbase in four variations in full

Axure RP 6 Prototyping Essentials: Advanced Interactions

by Ezra Schwartz | January 2012 | Architecture & Analysis Content Management WordPress

This article covers some advanced topics such as conditions, raised events, and so on.

In this article by Ezra Schwartz, author of Axure RP 6 Prototyping Essentials, we will cover a set of features such as raised events, conditional logic and variables, introduction to a terminology which is usually associated with programming and suggests complexity. It is understandable if you are not interested in, or are intimidated by, the prospect of coding, and wish to avoid using this set of Axure features as long as possible. You should not.

First, rest assured that no coding is involved. By now, you are familiar with Axure's Interactions and the Case Editor features, which require you only to select from a contextual selection of options and construct interactions by pointing and clicking. The only typing required is the labeling. You will find a similar easy-to-use interface when you use features such as the Condition Builder or simulate "drag and drop".

Secondly, think about some of the terminologies and methods we use in interaction design. We use branching logic to determine use cases, scenarios, and how functionality responds to user interaction under certain conditions. Axure makes it fairly easy to model the logic we need, in order to visualize branching paths, and express it in the interactive prototype.

Read Axure RP 6 Prototyping Essentials: Advanced Interactions in full

Away3D: Detecting Collisions

by Michael Ivanov | June 2011 | Open Source Web Graphics & Video

Three dimensions are better than two — and it's not a secret anymore that 3D is here to stay. Gone are the days when Flash was just used for 2D animations. In the last few years, online Flash content has undergone a revolution with the introduction of real-time 3D engines for Flash. Away3D is the big daddy of them all—which makes it the ultimate resource for top-rated 3D content development and for powering today's coolest games and Flash sites.

In this article by Michael Ivanov, author of Away3D 3.6 Cookbook, we will see how to detect collisions between objects in Away3D.

Read Away3D: Detecting Collisions in full

Away3D 3.6: Applying Light and Pixel Bender materials

by Matthew Casperson | March 2011 | Open Source Web Graphics & Video

Away3D includes a large selection of materials. There are various shading techniques that can be used by these materials, which allows for a selection of materials ranging from those that display a simple texture map to those more advanced materials, which produce more interesting detailed results like reflections, lighting, and shadowing.

In this article by Matthew Casperson, author of Away3D 3.6 Essentials, we will cover Pixel Bender, and seen how it has been used by Away3D to create some of these advanced materials. Those materials that can be lit from an external light source are listed, along with a table that breaks down the types of light sources that affect these materials. We will also see how resources, like textures, can be embedded into the final SWF, or loaded from external resources.

Read Away3D 3.6: Applying Light and Pixel Bender materials in full

Away3D 3.6: Applying Basic and Bitmap Materials

by Matthew Casperson | February 2011 | Enterprise Articles Web Graphics & Video

Away3D includes over a dozen material types that can be used to display 3D objects with a huge variety of effects, with some of the materials using the Pixel Bender technology new to Flash Player 10 to create a level of detail that has not previously been seen in Flash applications.

In the previous article by Matthew Casperson, author of Away3D 3.6 Essentials, we covered Materials, Lights and Shading Techniques with Away3D 3.6. In this article the focus will be on:

  • The different materials that can be created in Away3D
  • Illuminating materials with lights
Read Away3D 3.6: Applying Basic and Bitmap Materials in full

Away3D 3.6: Applying Animated and Composite materials

by Matthew Casperson | March 2011 | Open Source Web Graphics & Video

In this article by Matthew Casperson, author of Away3D 3.6 Essentials we will explore Animated and Composite materials. A number of materials can be used to display animations on the surface of a 3D object. These animations are usually movies that have been encoded into a SWF file. You can also display an interactive SWF file, like a form, on the surface of a 3D object. Composite materials are used to display a number of effects like shading, bump mapping, environment mapping, and lighting. The reader will comprehend this article better by referring the previous articles on:

Read Away3D 3.6: Applying Animated and Composite materials in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software