When talking about tunneling, different definitions come to people's minds. Basically, tunneling is transmitting data that is encapsulated into a pipe, over a public network (for example, the Internet). However, there are different methods to tunnel data over a public network for different approaches. For example, when security is a concern, tunnel protocols with cryptography are more favorable. But when performance has higher priority, protocols with lower packet overheads will be chosen. FreeBSD 7 has a built-in support for a number of important tunneling protocols, although there are also many third-party applications in FreeBSD packages that support more tunneling protocols.
This article by Babak Farrokhi, introduces the manipulation of tunnel interfaces in the FreeBSD 7 operating system. Let's have a look into the following:
In this article by Marc Delisle, we will learn how to perform some operations that influence tables or databases as a whole. We will cover table attributes and how to modify them, and also discuss multi-table operations.Read Table and Database Operations in PHP in full
XHTML Mobile Profile (XHTML MP) is the standard language for mobile web development. XHTML MP is an XHTML variant. It offers richer presentation and is very similar to HTML. XHTML MP is built on top of XHTML Basic. In this article by Nirav Mehta, we will have a look at the fundamentals of XHTML MP and the grammar which must be followed for development in it.Read Fundamentals of XHTML MP in Mobile Web Development in full
In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.
Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.
Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.Read User Access Control in Drupal 6 in full
Ever been to a night club on a Monday morning? There's you, there are chairs, and the potential to host a party on the weekend. There are lots of buttons, lots of potential, but no one there except you. Unlike a night club, you don't have to wait for the weekend to host your friends on Elgg. Invite them as soon as you're done setting up the software. Elgg is designed to make it easier for you to invite people. If you've ever setup a blog or rolled out your own website, how long did it take before you could invite your friends over? You had to put up all sorts of content to indulge them, and also fiddle around decorating the portal so that it doesn't look dull.
That's where a social network is different from a regular website. Websites follow a two-way, one-to-many style of interaction, where the owner of the website, or blog, talks to all his visitors who respond with their comments, either on the website, or via e-mail. In this article by Mayank Sharma, we discuss about social networking software that follows a many-to-many style of interaction. Members interact with each other, and create their own content, which is then shared with all. This is then discussed and commented on by everyone. The owner of the site is like the perfect host. They mingle, discuss with everyone, but don't stamp their authority, unless you're naughty. They're like every other member, except for the fact that they own the place. Sounds familiar? So, you don't have to worry about content before inviting your friends. Your friends bring their own content.Read Users, Profiles, and Connections in Elgg in full