Home Tags LFY March 2012

Tag: LFY March 2012

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina...

0
The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance...

Developing Apps on Qt, Part 3

7
In the previous article, we covered some important Qt non-GUI classes; I hope you experimented with others, since the secret to learning lies in...

Installing and Using PostgreSQL Modules

3
In this article, we will learn how to install and use the PostgreSQL modules chkpass, fuzzystrmatch, isn and hstore. Modules add different capabilities to...

Exploring Software: A Software Engineer’s Toolkit

1
Software engineering recommendations have not changed. The issues and concerns have been known for years. However, with the availability of excellent tools, it is...

Device Drivers, Part 16: Kernel Window — Peeping through /proc

8
This article, which is part of the series on Linux device drivers, demonstrates the creation and usage of files under the /proc virtual filesystem. After...

Open Source Robotics Software Platforms

2
http://www.youtube.com/watch?v=7cslPMzklVo This first article in the series on open source software for robotic introduces the reader to open source robotics software platforms and focuses on...

FOSS is __FUN__: The Fifth Freedom

2
Stallman's classic definition of open source speaks of the four freedoms -- the freedom to run the program in any way one likes, the...

ownCloud 3 Makes Setting up and Accessing Your Own Cloud Dead...

6
We are all aware that storing data in the cloud has its own advantages, making our data available everywhere we go. But storing our...

Taming the Big Data Beast with Hadoop and Alternatives

5
Turn the clock back to 1970 -- the year in which Edgar Codd published the paper "A Relational Model of Data for Large Shared...

Cyber Attacks Explained: Web Exploitation

2
Websites are no longer merely about having an "Internet presence" today, but are also used for commercial transactions and to transfer sensitive data. Such...