We are quite rich in terms of web browsers! Nevertheless, it's a bit surprising to know that even some quite popular web browsers cannot satisfy when it comes to managing downloads - be that Google Chrome or Mozilla. Often, you would have hated the l…
As mentioned in the previous post, in my quest to find an alternative to Kiwi Syslog, I looked at a few Software as a Service (SaaS) offerings first, and then started exploring open source log managment projects. I compiled the list below of all usef…
I commited the information below to report PDU of PMI. ^_^. In this paper, the author introduces his good experience of project management. I list it below with my learning and understanding in our development. Be Agile Learning: as a member of softw…
2013 Top 10 List A1-Injection Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended co…
转自:https://www.owasp.org/index.php/Top_10_2013-Top_10 Risk 2013 Table of Contents 2013 Top 10 List A1-Injection → A1-Injection Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a com…
转载自:http://technet.microsoft.com/en-us/magazine/gg299551.aspx Many companies have downsized their IT departments over the last few years. Many database administrators (DBAs) have ended up with responsibility for large numbers of SQL Server databases.…
Top 10 open source projects of 2015 Posted 15 Dec 2015Jen Wike Huger (Red Hat)Feed 188 up 31 comments Image credits : CC0 Public Domain, modifications by Jen Wike Huger We round up 10 editor's picks from the most popular projects this year. (Last ye…