Apache Session Management Within Dynamic Sites
This article will look at how Apache can help with session management and how that information can be used with Perl and PHP scripts.
Migrating to a Load Balanced IIS 6 Environment
Migrating to IIS 6 can be a daunting process. Depending on your existing hosting configuration, the process can take hours, days, or even weeks. Careful planning and research is integral to a successful migration.
Dig Deep, Display Shallow With Splunk
Tired of teasing through server logs with grep? Consider putting Splunk's AJAX-powered log analysis tools to work.
Password Gorilla
Many internet services require you to 'log in.' You choose a user name and a password, in combination called a 'login,' that authenticate you to the service.
Instant Messaging and Collaboration Converge
The attraction for businesses is that IM can increase productivity though improved communications and collaboration. Since all IM systems provide communication by definition, the key differentiator that will determine which enterprise IM systems will be successful is likely to be the collaboration element: the extent to which an IM system works with or is integrated with other corporate collaboration tools, such as shared work spaces, calendaring, directories and e-mail.
Securing Server 2003 Domain Controllers
Because the domain controller, as its name implies, in many ways has control over your Windows domain and all of the computers that belong to it, it is essential that you take extra precautions to ensure that your DCs are and remain secure. In this article, we will look at a few of the important security measures you should take in regard to your domain controllers.
Macintosh Internet Security Guide
This page provides links to background information, security vendors, comparative and individual reviews of personal firewall, anti-virus, anti-spam, privacy and suites of software as well as hardware firewalls and anti-theft services to help you protect your Macintosh desktop or laptop computer.
Security of the Internet
Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.
The Top 20 Most Critical Internet Security Vulnerabilities
Online Free
WWW Security
The chapter contains an introduction to cryptography, it then presents a protocol for safe communication in a client-server application and concludes with an example of how this protocol is used for buying a book through the World Wide Web.
Storage Server - Free eBook Storage Server - Download ebook Storage Server free
|