Search Content

Displaying 1 - 20 of 159

Network neutrality or bulk rate discount? Submitted by John …

… Small Business network support Submitted by John Locke on Thu, 11/18/2004 - … Miller has written an interesting essay about providing network and desktop services based on open source software in … Miller has written an interesting essay about providing network and desktop services based on open source software in …

… several clear types with greatly simpler editing forms End users can find items on the site even using misspelled search … several clear types with greatly simpler editing forms End users can find items on the site even using misspelled search …

… a good solution for you. We developed this for Better Care Network , who wanted to organize over 10,000 resources into a … results See the puzzle in action on the Better Care Network site, or on our Topics page. Not a current customer? …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … public_html/dojo git tag # shows you a list of available tags git checkout svn/release-1.3.2 # checks out Dojo version … Dojo and non-built Dojo. With a build, you need script tags to load your build layers, and, obviously, they need to …

… to roll back changes that go awry. Especially if you use tags effectively. For managing lots of related websites, it's … to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … minutes of entirely bad user experience...) Production tags and deployment We don't automatically deploy to …

… From the code above, you can see we have a paragraph tag and JavaScript code. The role of the JavaScript code is … The final result is Figure 7. Result of the exploitation process As you can see, the vulnerability that has been … of the current user's open tab, and create a new tag (if you want). This is a dangerous tool, so if it falls …

… releases. When you apply them to a Drupal development process that involves deployment across several server … on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … apply the updates on a site we've optimized for our process -- and once that has been done we can generally score …

… or cable modem. There is an ethernet jack on the wireless node and your home computer plugs into that. The wireless … the telephone company's wires and poles: it connects your node to the Internet, but without any nasty wires between the … a cable or DSL modem, do double-duty: when you put a node at your house, you actually help to increase the …

… What happened? Quite simply, somebody she knows got their Windows machine infected with a virus or spyware. Possibly … rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher …

… John Locke on Mon, 05/24/2004 - 15:56 Books Stealing the Network: How to Own the Box , by Ryan Russell, Ido Dubrawsky, … generating random passphrases and passwords Security and Network Policy , an example security policy SANS Institute …

… ways to classify nodes, with rigid hierarchies, free-form tags, geographical locations, and more. The "content … If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that … you want to have content organized by something more than tags and categories -- geographical location, date (other …

… on Mon, 06/12/2006 - 01:15 Carla Schroder covers a great network backup utility in her current series. Here's where … the rubber meets the road: Do Automated Cross-Platform Network Backups The Easy Way (Part 2) Recovering from attacks …

… stated purposes and Acceptable Use policies of any other network(s) or host(s) used. Each Customer and Client … use of the Services, including any unsupervised anonymous network access offered by Customers or Client organizations. … the integrity of other public or private computing and network systems. Users shall not intentionally develop or use …

… for your business. In order to stay competitive, your network and computer systems need to support your … and Design Server Support Backup/Recovery Email Network Design and Implementation Remote Access (VPN) …

… editors built out the structure of topics, and could start tagging their existing resources on their live site long … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … editors built out the structure of topics, and could start tagging their existing resources on their live site long …

… Since we can never speak to our services better than our clients, here is a testimonial from the webteam management at … it only strengthens your ability and commitment to the client. Thank you Freelock!” No, thank you Pencol!! … Since we can never speak to our services better than our clients, here is a testimonial from the webteam management at …

… bother. Greylisting has been extremely effective for our clients who are willing to wait an hour or two for new mail. … bother. Greylisting has been extremely effective for our clients who are willing to wait an hour or two for new mail. …

… Microsoft breaks WebDAV in Windows XP, Vista Submitted by John Locke on Mon, 06/30/2008 … this appears to be the situation, version by version: * Windows 98, 2000, XP (does this still work in SP2/3? Dunno): …