Linux servers are a complex blend of hardware and software. Each component must fulfill its role for the server to work. When people think about servers, it’s often the hardware they think of as being the most complex part, but server hardware is a bit like Lego: a bunch of parts that fit together in well–defined configurations. Memory goes in slots that only memory can go in. Hard drives plug into ports made for plugging hard drives into. Of course, each of these components is massively complex in itself, but we don’t have to think about that. Read More →
Code reuse makes developers more productive. Why waste time writing a jQuery plugin to animate a loading spinner when you can just grab one from GitHub? The incredible pace of modern web development is facilitated by our ability to stand on the shoulders of developers who have already put in the work. Read More →
WHOIS Privacy prevents the publication of the personal details you submitted when you registered your domain.
When you register a domain, you submit contact information to the registrar, including your name and your address. The registrar takes this information so they know who they are dealing with — it’s part of the rules of the domain registry system. Read More →
November was a really big month around the country. The Cubs defeated the Indians in a thrilling seven games series to win the World Series for the first time in 108 years! Go Cubbies! And the United States elected its next President. With cybersecurity continuing to be an issue, see the San Francisco rail system hacking, it seems that improving online security will be part of the new President’s agenda. Moving on from world news, let’s jump right into the industry content. Without further ado, head to the rest of the roundup below for November’s best content. Don’t forget to follow us on Twitter, Facebook, and Google+ for the same great content the rest of the year! Read More →
In July, the CMS account of a TechCrunch writer was hacked. The hackers used their access to publish a blog post, which automatically published posts to TechCrunch’s social media. Fortunately, the hackers were interested in publicizing their “security services,” but consider what could have happened. Read More →