Search Content

Displaying 1 - 20 of 178

… Windows machine connected to the Internet without a firewall to be compromised. The typical Linux machine takes … Windows machine connected to the Internet without a firewall to be compromised. The typical Linux machine takes …

… Hardware hacking an Internet phone Submitted by John Locke on Tue, 07/05/2005 - 00:38 … to set up an office phone line using Asterisk at Home . The latest version has added a custom SugarCRM package, …

… visitors can freely interact, without opening the door for comment spam. Comment spam does work -- for a while. But at what cost? If …

… to download!) You now have the entire dojo tree, with trunk checked out, in the public_html/dojo directory. Dojo's … to all .git* files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an … set up. We've been developing with the main Dojo trunk. But what if you want to use a stable Dojo release? …

… up and try delivering again in an hour or so. Infected bot-nets don't bother. Greylisting has been extremely … spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents … spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents …

… analytics.  Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … analytics.  Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights …

… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… those in place, I haven't seen any tool that does a better job for deployment than git. How we use git for deployment … managing deployments of site code -- git does a far better job for that, as we've already seen. At least if you're … alternative to git for deployment that does as good a job... What do you use for deployment? Why shouldn't we use …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher … rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher …

… of our client's servers had completely disappeared off the Internet. I confirmed that I could not reach the site, or the … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that will take people who scan it with a … If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that …

… taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, … taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, …

… preserve their old revenue model, and discriminate against voice traffic that goes over data. If we looked at this as a … preserve their old revenue model, and discriminate against voice traffic that goes over data. If we looked at this as a …

… on top of Matrix. The creators of Matrix had both VR and "Internet of Things" purposes in mind when they designed the … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… level Add spam-fighting solutions at the server/firewall level Deploy more advanced caching solutions, such … level Add spam-fighting solutions at the server/firewall level Deploy more advanced caching solutions, such …

… opportunity to work with. Not only are you doing a great job with our maintenance plan but by sharing your steps of … opportunity to work with. Not only are you doing a great job with our maintenance plan but by sharing your steps of …

… News: FuseIQ and Freelock joining forces! Submitted by John Locke on Tue, … and deliver more insight and value across the board. About Freelock Freelock was founded in 2002 by John Locke as …

… Linux.com | Using a Linux failover router Submitted by John Locke on Sat, …

… the homeowner may notice is a slight slowdown in their Internet connection. But meanwhile, their cable modem or webcam was out bringing down the Internet. This was just one of the scenarios described by …