Plus, Andrew Lock offers a small business marketing lesson on solution selling and an interview with business success coach, Marc Accetta on the value of edutainment.
<b>Howtoforge:</b> "This guide explains how to set up mod_chroot with Apache2 on a Fedora 12 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications."
<b>Intellectual Property Watch:</b> "“Apple is selling directly to consumers, who aren’t the best guardians of their own self-interest. The open PC model works for knowledgeable users who know what they are doing and how to protect themselves, but not so for 15-year-old fashionistas and techno-phobic geriatrics,” Kahney said."
<b>Linux.com:</b> "Nokia's Vice President of MeeGo Devices, Ari Jaaksi, will kick off the afternoon at today's Linux Foundation Collaboration Summit with his keynote at 1:15 p.m. PT. He took a few minutes with us this morning to share what he'll be speaking about and how the MeeGo project is going."
<b>Linux Planet:</b> "Web-based applications are fantastic, except for that whole "running in the browser" thing. Looking to free your browser-based apps from your Web browsing? Take a look at Mozilla Prism."
IBM is giving its DB2 database software a major upgrade, with new federated data-management and self-managing capabilities. IBM, which is in a tight database race with Oracle, says DB2 version 8 will be pushed particularly to midsize companies.
Query optimization is an often overlooked part of applications. Sean Hull encourages at least some attention to query optimization up front and helps you identify some of the more common optimizations you may run across.
It's a challenge to adapt to change, but the changes in IBM DB2 9.7's Database Administrator authority bring significant database security benefits. Join Rebecca Bond as she shares some twists, some turns, and some clues regarding DB2 9.7's Database Administrator (DBADM) authority.
<b>Datamation:</b> "This year, we've once again updated our list of top open source security apps. While the list isn't exhaustive by any means, we tried to include many of the best tools in a variety of categories."
<b>The Register:</b> "The BBC has tried to draw a line under its decision to bar open source implementations of RTMP (real-time messaging protocol) streaming in the iPlayer, after The Register revealed the Corporation's quiet switcheroo last week."
<b>Linux.com:</b> "Slackware Linux is still going strong. The Slackware Linux Project released Slackware 13.1 on May 24th.This is just a little by shy of the 17th anniversary of Slackware 1.0 and not quite a year after Slackware 13.0. Delve back into yesteryear with me; you're in for a treat."
It's possible to treat a text file as a data table, and use the standard approaches to dealing with tables, which is a major advantage in that you can use SQL to filter the text in the file. Doug Steele shows you how.
With the introduction of SQL Server 2008 came Resource Governor. With this new feature, you can control resource allocations based on rules. Greg Larsen explains how to setup resource governor, how to use it and the limitations associated with this new resource allocation tool.
Discover an easy way to set up system-wide global API hooks using AppInit_DLLs registry key for DLL injection and Mhook library for API hooking. To illustrate this technique we will show how to easily hide calc.exe from the list of running processes.
Windows Server 2008 R2 includes a new Best Practices Analyzer for Active Directory Domain Services, which facilitates the implementation of best practices in your Active Directory Domain Services environment.