Search Content

Displaying 1 - 20 of 97

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …

… taking us down in the future. Cheers, John Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… to my comment Comment About text formats Filtered HTML Web page addresses and email addresses turn into links …

… sites, two of the biggest providers went down yesterday , Amazon and Akamai, in several separate incidents. And it sounds like one of the Amazon incidents actually involved losing customer data . …

… Our Partners We don't work in a vacuum. Freelock is part of a much larger community. Here are some of our partners who we regularly do business with. We highly …

… or have found ways to improve it further? Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… FFFFFF&fc1=000000&lc1=0000FF&t=freelollc-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0307279189" … FFFFFF&fc1=000000&lc1=0000FF&t=freelollc-20&o=1&p=8&l=as4&m=amazon&f=ifr&ref=ss_til&asins=0307279189" …

… patching this core issue , and many changing patches for Media 2.x and other modules). We call this clone our … patching this core issue , and many changing patches for Media 2.x and other modules). We call this clone our …

… Cloud applications are extremely cost-effective for their users -- the service provider handles all the hassles … layer, and then spreads that cost across thousands of users. In terms of up-front cost, cloud applications are … Cloud applications are extremely cost-effective for their users -- the service provider handles all the hassles …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… it on a variety of the environments we work in, or have in production. Here's a quick run-down of what we found … it on a variety of the environments we work in, or have in production. Here's a quick run-down of what we found …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… among other things we set up a booth registration product. Exhibitors can fill out a form that actually creates … we created a content type for exhibitors, set it up as a product that could be purchased through the store, and showed … among other things we set up a booth registration product. Exhibitors can fill out a form that actually creates …

… Secure hosting environments Preventing Attacks Add new comment You must have JavaScript enabled to use this form. … not be shown publicly. Homepage Subject Notify me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… Client accidentally deleted their server. We recovered in less than an hour! Submitted by John … Not this time! No site, and I couldn't even reach the server. I pulled up the client's AWS credentials and logged …

… Peninsula College and Athletics Sites Peninsula College Peninsula College reached out to us … in 2012 for some emergency work related performance issues on their site and problems with their site crashing. Once we … spent time to patch the attacks and brought them back to square one. Then in February of 2015, they reached out to us …

… bother. Greylisting has been extremely effective for our clients who are willing to wait an hour or two for new mail. … bother. Greylisting has been extremely effective for our clients who are willing to wait an hour or two for new mail. …

… being a "distributed system", the core code that people store in gitlab would always have multiple copies -- the data … being a "distributed system", the core code that people store in gitlab would always have multiple copies -- the data …

… where it describes what kind of damage XSS could do to users and to a web site. In the following link, you can see … them to the hacker stealing files from the attacked user's computer or the network she has access to probing a … XSS vulnerability is the result of a web page that allows users to execute JavaScript code. To see if a site is …