|
||||||
|
||||||
O'Reilly Open Source Convention: July 26-30, Portland, OR. |
|
Filtering IDS Packets Intrusion detection systems (IDS) can scan your network for suspicious packets but someone has to review the logs. Even if you find something odd, can you wade through hundreds of thousands of packets looking for evidence? Clever security administrators understand how to narrow down the search. Don Parker explains how to use Berkeley packet filters and bitmask filters to improve your IDS use. [ONLamp.com] A Day in the Life of #Apache In Rich Bowen's latest column based on his conversations on the IRC channel #apache, he attempts to answer a question that comes up at least once a day, but which doesn't have one clear answer: whether to use Apache 1.3 or 2.0. Find out why the answer is not a simple one. Rich is a coauthor of O'Reilly's Apache Cookbook. [ONLamp.com] Code Improvement Through Cyclomatic Complexity Overly complex code is dangerous, hard to maintain if not already buggy. But what do we mean by "complex"? The metric of cyclomatic complexity helps show where the most complex code is. As Andrew Glover illustrates, finding the complex code is also the first step to refactoring it. [ONJava.com] Java Development on Eclipse, Part 2 In this conclusion of a two-part series of excerpts from Eclipse, author Steve Holzner provides still more examples of how Eclipse makes it easier to create Java code from scratch. This week he covers creating Javadocs, refactoring, adding certain skills to your Eclipse toolbox, and customizing the development environment. [ONJava.com] Features Interruptible Database Queries Perceived performance isn't just about speed; it's also about responsiveness. And few things frustrate a user like an application that ignores user input because it's off doing something else. Slav Boleslawski introduces threading techniques to keep database queries and result retrieval from locking up an application. [ONJava.com] XML-Deviant Sacré SVG Reading and Writing Registry Keys with Visual Basic Need to use Visual Basic to perform basic operations upon registry keys? It's not tough to do, once you know the basics. Ron Petrusha shows you how. [WindowsDevCenter.com] Best Practices for Assigning FSMO Roles Getting FMSO roles right is key to the proper operations of an Active Directory environment. Mitch Tulloch, author of Windows Server 2003 in a Nutshell, shows you how to make sure you use them properly. [WindowsDevCenter.com] A Brief Introduction to GPS Photo Linking Digital cameras record EXIF data that tells us "when" we took a picture, but what if wewant to know "where" too? Contributor to O'Reilly's Digital Photography Hacks, David Goldwasser introduces us to using GPS positioning data with EXIF timestamps to build interactive maps showing pictures of markers. What a sweet convergence of technologies. [MacDevCenter.com] RSS: The Next Generation Syndicated summaries of web content are more popular than ever before, and the recent explosion of users has prompted some dramatic changes in the world of RSS software. Giles Turnbull takes a look at some of the latest offerings, including PulpFiction, Shrook, and of course, NetNewsWire. [MacDevCenter.com] Version Control with Subversion: Basic Concepts Subversion is an open source version control system that can access its file repository across networks. Various users are able to modify and manage the same set of data from their respective locations. Collaboration is fostered, and changes can occur more rapidly. This preview of Chapter 2 from Version Control with Subversion highlights the bsic concepts of this important new version control system. [oreilly.com] Liberty on Whidbey Security Alerts Introduction to Bioinformatics Bioinformatics is the intersection of molecular biology and computer science. For software developers, its a fascinating area in which to work. Mac OS X is gaining popularity in this arena, and this article introduces you to the concepts and opportunities related to bioinformatics. [MacDevCenter.com] The Evolution of Perl Email Handling There are many modules on the CPAN for slicing and dicing email, and we're going to take a whistlestop tour of the major ones. We'll also concentrate on an effort started by myself, Richard Clamp, Simon Wistow, and others, called the Perl Email Project, to produce simple, efficient and accurate mail handling modules. [Perl.com] |
A PHP Guy at YAPC: Part I [Chris Shiflett] Open source GIS proves its maturity with excellent conference [Tyler Mitchell] Why does web news suck? [brian d foy] Chat with an InfoCom game [brian d foy] Read, reference, and comment--an online format that does it all [Andy Oram] On building an application security programme [Justin Clarke] How To Kill a Windows Network [Scot Hacker] Five things the next iTunes version needs to have [Harold Martin] 2004 JavaOne Conference Just around the corner by Dana Nourie JavaOne Thoughts in the Desert by Edward Ort The java.net Fairness Board by John "jbob" Bobowicz Carbonizing Java by Daniel H Steinberg JXTA 2.3 ships by James Todd Is EJB3 another elephant? by Daniel H Steinberg Maven: 'I love you' afterall by Andreas Schaefer |
Sponsored by:
|
Contact Us | Advertise with Us | Privacy Policy | Press Center | Jobs Copyright © 2000-2004 O’Reilly Media, Inc. All Rights Reserved. |