The History of Programming Languages
Over at O’reilly.com they have compiled an interesting diagram charting the development timeline of over 50 programming languges over the last 50 years of program code. Check out the .pdf poster...
View ArticleChanging the SSH port on cPanel Servers
Protect yourself against brute force attacks by changing the SSH port To change the SSH port number login as root, and edit /etc/ssh/sshd_config Find the line that says Port 22 and change 22 to any...
View ArticleMagento performance and optimization
The objective for this group is to share experiences on how fast Magento runs on your configuration and how to optimize it at different levels (hardware, mysql/php config tweaking, PHP accelerators) or...
View ArticleWordPress 3.0.4 Important Security Update
Version 3.0.4 of WordPress, available immediately through the update page in your dashboard or for download here, is a very important update to apply to your sites as soon as possible because it fixes...
View ArticleW3C’s Unified CSS Validator
It is crucial to always check one’s code for validity. The curiously titled “Unicorn” tool from W3 provides anybody from designer to experienced developers, a simple standards check for Stylesheets,...
View ArticleHTML 5 Browser compatibility test
With HTML5 being the talk of Developer Town, one must keep in mind that not all browsers support this gleaming new standard. Check out the URL below for a very handy test to see how your browser keeps...
View ArticleThe Ceylon Project – nothing like a hot cuppa
The questions that divide us: cats vs dogs, this *nix vs that *nix, tea vs coffee…Ceylon vs Java? Now we are getting specific. Boasted with the gutsy description of the “Java Killer”, The Ceylon...
View ArticleOpen Source Hardware; Lessons on the software Industry from Monty Python
Ever thought about adding physical items to your Open Source toolkit? Seems it has already been done with Open Source hardware. The implications for this to the developing world are great; as well as...
View ArticleThe Adobe CS5.5 Roadshow is coming Down South
Yeeha folks. It’s that time again – dates have been announced for New Zealand/Australia’s Roadshows. Check out the link after the break for more information!...
View ArticleSecuring osCommerce Websites
Over recent years, osCommerce has increasingly become a target of hackers. It seems every few months a new exploit gains traction and causes havoc amongst osCommerce shop owners. In recent weeks, we...
View ArticleCSF security upgrade
ConfigServer Firewall : New Version 5.30 Fixed a SECURITY BUG that can be exploited remotely via log file spoofing resulting in root privilege escalation. Our thanks to Jeff Petersen for reporting this...
View Article15 surefire ways to speed up your site
Sam Quayle considers new developments, tools and, most importantly, the techniques you can use to improve page loading times and grasp your users’s diminishing attention Two seconds. According to a...
View ArticleDebunking PHP’s Bad Reputation
Freelance PHP consultant Lorna Jane Mitchell explains why PHP’s bad reputation is unwarranted, explodes some popular myths and suggests some excellent resources along the way PHP has the reputation of...
View ArticleWhen you need a doctor…
There is a time when things go wrong and your site might feel a little unwell. You might experience various browser complaints, unpredictable behaviour and nonspecific browsing discomfort. The good...
View ArticleSecuring and Hardening WordPress
Security in WordPress is taken very seriously, but as with any other system there are potential security issues that may arise if some basic security precautions aren’t taken. This article will go...
View ArticleSSL – Partially Encrypted
After installing an SSL, a common subsequent issue (in most modern browsers) is the the dreaded “Connection Partially Encrypted” warning....
View ArticleUrgent Joomla upgrade and security news
Please find below links for the Joomla Vulnerable Extensions List and the Joomla Security news. Always keep your Joomla install updated to avoid them being hacked and compromised!...
View ArticleUpdating Exim Mail Server
Exim is a Message Transfer Agent (MTA) developed at the University of Cambridge for Unix based systems. It is extremely important to keep your Mail Server Security settings in check and the first step...
View Article10 Reasons Your WordPress Site Got Hacked
WordPress is an excellent CMS, however, like with all web-applications, they require tweaking on the user’s behalf to make them bulletproof against common web-threats. If your WordPress site has been...
View ArticleJoomla 1.5 security patch made easy to install
Recently, important updates were released for Joomla 2.5 and Joomla 3.1 that address a critical security issue where unauthorized file uploads may be uploaded to a site. Joomla 1.5 is also affected by...
View Article
More Pages to Explore .....