<b>Howtoforge:</b> "This guide explains how to set up mod_chroot with Apache2 on a Fedora 12 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications."
<b>Dissociated Press:</b> "I love the concept, hate the execution. I've written about that before. Facebook encourages the kind of bad netiquette it's taken years to drum out of people. "Oh, I like this page and look - it has a 'forward to all my friends' button.""
Query optimization is an often overlooked part of applications. Sean Hull encourages at least some attention to query optimization up front and helps you identify some of the more common optimizations you may run across.
<b>Linux.com:</b> "Nokia's Vice President of MeeGo Devices, Ari Jaaksi, will kick off the afternoon at today's Linux Foundation Collaboration Summit with his keynote at 1:15 p.m. PT. He took a few minutes with us this morning to share what he'll be speaking about and how the MeeGo project is going."
<b>Tech Source:</b> "Since our collection of Free and Open Source finance/accounting software for Linux has been quite popular, I would like to add 7 more to that list."
It's a challenge to adapt to change, but the changes in IBM DB2 9.7's Database Administrator authority bring significant database security benefits. Join Rebecca Bond as she shares some twists, some turns, and some clues regarding DB2 9.7's Database Administrator (DBADM) authority.
<b>Linux.com:</b> "Slackware Linux is still going strong. The Slackware Linux Project released Slackware 13.1 on May 24th.This is just a little by shy of the 17th anniversary of Slackware 1.0 and not quite a year after Slackware 13.0. Delve back into yesteryear with me; you're in for a treat."
The storage networking switch maker watched its stock plummet Tuesday after it reported disappointing sales from the Ethernet business it acquired from Foundry for $3 billion in July 2008.
It's possible to treat a text file as a data table, and use the standard approaches to dealing with tables, which is a major advantage in that you can use SQL to filter the text in the file. Doug Steele shows you how.
<b>The Register:</b> "The BBC has tried to draw a line under its decision to bar open source implementations of RTMP (real-time messaging protocol) streaming in the iPlayer, after The Register revealed the Corporation's quiet switcheroo last week."
<b>Michael Geist:</b> "The U.S. government has released its annual Special 301 report in which it purports to identify those countries with inadequate intellectual property laws. Given the recent history and the way in which the list is developed, it will come as no surprise that the U.S. is again implausibly claiming that Canada is among the worst of the worst"
<b>The H Open:</b> "Moodle , the E-learning platform, is one of the most significant and successful projects in open source. Despite its success, with hundreds of thousands of people being taught by courses written in Moodle, as a product it is not well known."
Your notebook computer budget's tight, but that doesn't mean you want a piece of…well, you know. Critics across the Web weigh in to help you buy the best notebook PC for less than $800.
RSA panel of experts says the U.S. is under daily cyber attacks by China, Russia, and their proxies. What can we do to protect our key systems and privacy?