Home 2012 February

Monthly Archives: February 2012

Is it the best IDE?

FOSS is __FUN__: The Best IDE

2
In any forum that talks about programming, a frequent topic is, "What is the best IDE for the language/framework under discussion?" This often leads to...
Healthcare can't wait!

Exploring Software: Easier Healthcare Using IT

1
This article is not so much about trying out any software as about the need we all feel for reliable care-givers for the elderly...
How to become a hacker!

Hackers and the Open Source Revolution

8
This piece corrects the confusion created by mainstream media between "hacker" and "cracker". It also considers the history, nature, attributes, ethics and attire of...
security assessment tools

Top 10 Security Assessment Tools

14
Modern data centres deploy firewalls and managed networking components, but still feel insecure because of crackers. Hence, there is a crucial need for tools...
Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

4
We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...
Mahshad Koohgoli, CEO, Protecode

Protecode: Software License Management is Like Any Other Quality Management Process

0
Someone rightly observed: "All code is guilty, until proven innocent." Ask the members of any software development team, and they will agree that tracking...
Serving WordPress from a Debian-powered Nginx

WordPress on Nginx, Part 2: vhost, MySQL & APC Configurations

14
Last time around we made our Debian VPS ready with the LEMP recipe. Let's now configure the stack and migrate over the old WP...
Preparing a Debian-based LEMP server

WordPress on Nginx, Part 1: Preparing VPS the Debian Way

6
In this first part, we deal with the LEMP (Linux, Nginx, MySQL, PHP) stack recipe and set up the basic server after installing the...