In this article series by Alistair McDonald, we will cover some important topics that discuss the use of Spam Assassin in conjunction with Procmail to filter out the wide range of spam that afflicts the modern e-mail user.
In this article, we will learn:
- How to customize SpamAssassin to update new rules set automatically to keep your system's spam detection well tuned.
- How to integrate spam filtering with virus recognition using amavisd.
In this article series by Alistair McDonald, we will cover some important topics that talks about the use of Spam Assassin in conjunction with Procmail to filter out the wide range of spam that afflicts the modern e-mail user.
In this article, we will learn:
- Why spam is difficult to deal with and why spam filters requires regular updates.
- How to download, install, and configure SpamAssassin.
In this article by Rainer Eschen, we will take a look at what a desktop-like presentation means to modern web applications. We will learn the design principles and start with a common page layout based on the Facelets templating.Read User Interface Design in ICEfaces 1.8: Part 1 in full
Very often in Moodle we might have several teachers working together on the same course but with different classes. We saw in the article Setting up your Moodle gradebook that this is made easier by the use of groups where each teacher and their students can be put into one class or "group" in the gradebook. In this article by Mary Cooch, we will see how the resources can be accessed by the group selectively by using "groupings" in Moodle.Read Controlling Which Class Sees Our Resources in Moodle 1.9 in full
This is the second part of the article series on User Interface Design in ICEfaces 1.8. This article will cover facelets templating and templating in ICEfusion. Read User Interface Design in ICEfaces 1.8: Part 1 here.Read User Interface Design in ICEfaces 1.8: Part 2 in full
Apache Geronimo provides a mechanism for users to extend its functionality through plugins. In this article by Vamsavardhana Reddy Chillakuru, we will explore how to extend the functionality of Apache Geronimo, by using Geronimo plugins. In fact, all of the Java EE functionality in Apache Geronimo is installed as plugins. For example, the web services functionality is provided through the Axis, Axis2, and CXF plugins. EJB functionality is provided through the OpenEJB plugin, and so on. Therefore, if you want to extend the server to provide new functionality, such as job scheduling, then you can write a plugin to integrate a scheduler (such as Quartz) into Apache Geronimo. There are also a large number of plugins available for Apache Geronimo already. We will also cover the custom server assemblies feature in this article. This feature will enable you to export custom server assemblies, from either the server's Administration Console or the command-line shell. In this article, you will learn about:
- Developing and installing Apache Geronimo plugins
- Extending the Administration Console through plugins
- Creating custom server assemblies
In this article by Jose Sandoval, we will move into the world of design for fully complaint RESTul web services. We usually talk about creating web services that are noun dependent as opposed to verb dependent. In this article we will look at what that means in terms of the design process by designing a blogging application.Read RESTful Java Web Services Design in full
In this article by Jose Argudo Blanco and David Upton, we will see how CodeIgniter actually works, "under the hood". This article introduces a bit on object-oriented programming and how CodeIgniter makes use of it, including the use of the CI super object, and how we can modify and use. Here, we will also understand why things happen in certain ways, as opposed to just knowing that they do.Read CodeIgniter 1.7 and Objects in full
In this article by Jose Sandoval, we implement the web service requirements we outlined in the previous article on RESTful Web Services Design, with the RESTEasy framework. RESTEasy is not only a RESTful framework, but is also JBoss's umbrella project that provides other frameworks to build RESTful web services. As part of the REST facilities, RESTEasy fully implements the JAX-RS specification. Subsequently, we only look at how we use RESTEasy to implement RESTful web services. At the time of this writing, the released version is 1.1GA.Read RESTful Web Service Implementation with RESTEasy in full
This article by M.L.Srinivasan, covers concepts related to vulnerability assessment and penetration testing.
In this article, we'll focus on IT vulnerabilities, the impact due to compromise, and the overall cycle of vulnerability and penetration tests. We'll also discuss some of the emerging standards in terms of vulnerability naming systems such as Common Vulnerabilities and Exposures (CVE), which is a dictionary for vulnerability names; and Common Vulnerability Scoring System (CVSS), as defined by the National Institute of Standards and Technology (NIST).Read CISSP: Vulnerability and Penetration Testing for Access Control in full
In this article by Dan Wellman, we will look at the tabs component of jQuery UI; a simple but effective means of presenting structured content in an engaging and interactive widget.
In this article, we will discuss the following topics:
- The default implementation of the widget
- How the CSS framework targets tab widgets
- How to apply custom styles to a set of tabs
- Configuring tabs using their options
- Built-in transition effects for content panel changes
REST (REpresentational State Transfer) is an architecture for distributed hypermedia systems. The World Wide Web is possibly the best known implementation of this architecture style. The term "REST" was coined and described by a dissertation written by Roy Fielding in 2000. This article by Nicholas Floyd covers the architecture which contains four basic constructs that address common concerns such as: scalability, generalized interfaces and resources, and patternized approaches for manipulation of resources.Read Developing a REST based Web Service in full
This article by M.L.Srinivasan, covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures.
Access control, as the name implies, is the domain that deals with controlling access to information and the associated information system assets such as computers, networks, data center, etc. As with the overall objective of information security, access control is to preserve the CIA of information assets by way of administrative, technical (logical), and physical controls.Read CISSP: Security Measures for Access Control in full