"security holes" tag
Hacker alert!

Modify-function-return-value Hack! — Part 1

Sometimes it’s helpful to think from a hacker’s perspective. The information obtained can be used to write better code and a secure application. An application shipped in release mode (without any debug information)…

Comprehensive LAMP guide

The Comprehensive LAMP Guide — Part 2 (MySQL)

MySQL is the most widely used Relational Database Management System (RDBMS), and is the “M” in the LAMP stack. One of the main uses for MySQL is with Web applications. To avoid the…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.