Halaman

Minggu, 29 April 2012

adamdbradley / foresight.js

. Minggu, 29 April 2012 .


Introduction

Foresight.js gives webpages the ability to tell if the user's device is capable of viewing high-resolution images (such as the 3rd generation iPad) before the image has been requested from the server. Additionally, it judges if the user's device currently has a fast enough network connection for high-resolution images. Depending on device display and network connectivity, foresight.js will request the appropriate image for the webpage. By customizing the img src attribute using methods such as URI templates, or finding and replacing values within the URI, it is able to form requests built for your image's resolution variants. Media queries however, could be used when dealing with CSS background-images, while foresight.js is used to handle inline img elements (or until current web standards are improved).
Foresight.js has made significant improvements over its previous versions, specifically the implementation of the CSS image-set() function. The latest version lets the browser take control of the image's browser dimensions completely, while the original foresight.js release only worried about which image to request according to the network connection and device pixel ratio. Additionally, foresight.js was previously centered around requesting dynamically sized images, and while this is still possible, it also ensures its easy to request static based images (such as images with "_2x" or "-highres" in the filename). For a more in-depth write-up on foresight's concept please review my article: Using CSS to control image variants.

(Read More..)

Retina.js : Retina graphics for your websit

.

http://retinajs.com/

(Read More..)

WebSploit Toolkit 1.6 Released

.

http://thehackernews.com/2012/04/websploit-toolkit-16-released.html

(Read More..)

The Essentials of Zepto.js

.

http://net.tutsplus.com/tutorials/javascript-ajax/the-essentials-of-zepto-js/

(Read More..)

Managing Gearman with gearadmin tool

.

http://www.hermanradtke.com/blog/blog/managing-gearman-with-gearadmin-tool

(Read More..)

An Illustrated Guide to SSH Agent Forwarding

.

http://www.unixwiz.net/techtips/ssh-agent-forwarding.html

(Read More..)

stackoverflow like http://linuxexchange.org/

.

http://linuxexchange.org/

(Read More..)

Foundation Icon Fonts, FTW!

.


Foundation Icon Fonts, FTW!


(Read More..)

nginx-and-codeigniter/

.

http://kbeezie.com/view/nginx-and-codeigniter/

(Read More..)

12 Cool HTML5 Geolocation Ideas

.

http://css.dzone.com/articles/12-cool-html5-geolocation

(Read More..)

Calligra 2.4.1 Released : office Suite

.

http://www.calligra.org/news/calligra-2-4-1-released/

(Read More..)

Permanent Reverse TCP Backdoor for IPhone and IPad

.

http://thehackernews.com/2012/04/permanent-reverse-tcp-backdoor-for.html?

(Read More..)

> Testing Codeigniter with Firebird

.

http://albringas.com/modules/AMS/article.php?storyid=17

(Read More..)

csshx

.

Cluster SSH tool for Mac OS X Terminal.app


http://code.google.com/p/csshx/

(Read More..)

Penetration Testers Get Ready - BackBox Linux 2.05 released !

.


he BackBox team has announce the release 2.05 of BackBox Linux. The new release include features such as Ubuntu 11.04, Linux Kernel 2.6.38 and Xfce 4.8.0.

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

(Read More..)

Rickshaw is a JavaScript toolkit for creating interactive time series graphs

.

http://code.shutterstock.com/rickshaw/

(Read More..)

MBR Parser

.

http://gleeda.blogspot.com/2012/04/mbr-parser.html

(Read More..)

CSS Selectors Defined

.

http://www.impressivewebs.com/css-selectors/

(Read More..)

TapLogger Android Trojan can Determine Tapped Keys

.

http://thehackernews.com/2012/04/taplogger-android-trojan-can-determine.html

(Read More..)

Load balancing with HAProxy¶

.

http://www.percona.com/doc/percona-xtradb-cluster/haproxy.html

(Read More..)

TodoMVC Lab

.

http://addyosmani.github.com/todomvc/labs/

(Read More..)

The anatomy of Flashfake. Part 1

.

http://www.securelist.com/en/analysis/204792227/The_anatomy_of_Flashfake_Part_1

(Read More..)

mruby / mruby

.


!Notice!!

This is a preliminary release for internal team review.
The URLs and addresses described below are not available yet.
The official release will be announced later.
Any suggestion for modification is welcome.
Delays in replies are to be expected. Sorry in advance.

What's mruby

mruby is the lightweight implementation of the Ruby language complying to the ISO standard. mruby can run Ruby code in 'interpreter mode' or 'compile and execute it on a virtual machine' depending on the developer's preference.
This achievement was sponsored by the Regional Innovation Creation R&D Programs of the Ministry of Economy, Trade and Industry of Japan.


https://github.com/mruby/mruby

(Read More..)

MariaDB's Virtual Columns

.

I wanted to evaluate MariaDB's virtual column and see if it could store business rules next to table data. With virtual columns this could be done and if you specify as 'virtual', would not even take up space on disk.

The imaginary use case is that there is a sales team in a company and you would like to evaluate if a particular salesperson is eligible for a bonus. In order to get a bonus, you need to sell above the average for the day and be in the top 5 amongst the salespeople.

So here is what I did:


MariaDB [test]> create table salespeople (id int unsigned not null auto_increment primary key, salesperson_id int unsigned not null , `date` datetime not null default 0, sold decimal(15,2) not null default 0, day_avg decimal(15,2) not null default 0,  above_avg char(1) as (if(sold>day_avg,'Y','N')) virtual);
Query OK, 0 rows affected (0.02 sec)

http://www.jonathanlevin.co.uk/2012/04/mariadbs-virtual-columns.html

(Read More..)

Extracting one table from mysqldump or phpMyAdmin backup

.

http://www.dbasquare.com/2012/04/19/extracting-one-table-from-mysqldump-or-phpmyadmin-backup/

(Read More..)

philsturgeon / codeigniter-restserver

.


CodeIgniter Rest Server

A fully RESTful server implementation for CodeIgniter using one library, one config file and one controller.

(Read More..)

A few hacks to simulate mysqldump --ignore-database

.

http://datacharmer.blogspot.com/2012/04/few-hacks-to-simulate-mysqldump-ignore.html

(Read More..)

Freeicons

.

http://brankic1979.com/icons/

(Read More..)

Fusion-io Software Development Kit Enables Native Flash Memory Access

.

http://www.fusionio.com/press-releases/fusion-io-software-development-kit-enables-native-flash-memory-access/

(Read More..)

HTG Explains: What’s the Difference Between Sudo & Su?

.

http://www.howtogeek.com/111479/htg-explains-whats-the-difference-between-sudo-su/

(Read More..)

Google's SPDY module accelerates Apache

.

http://www.h-online.com/open/news/item/Google-s-SPDY-module-accelerates-Apache-1542308.html

(Read More..)

Physical Memory Analysis with the LiME Linux Memory Extractor

.

The LiME Loadable Kernel Module allows digital investigators to perform physical memory analysis on Linux and Linux-based devices such as Android smartphones. LiME could capture currently running and previously terminated apps, for example, and the IP addresses of other devices to which it has connected. In this Linux.com interview, Joe Sylve, a Senior Security Researcher at Digital Forensics Solutions, explains what LiME is and how it works.


https://www.linux.com/learn/tutorials/565969:physical-memory-analysis-with-the-lime-linux-memory-extractor

(Read More..)

winAUTOPWN v3.0 Released - System vulnerability exploitation Framework

.


The improved GUI extension - WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ]is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend.  C4 - WAST gives users the freedom to select individual exploits and use them.

BSDAUTOPWN has been compiled, like always for various flavours and has been upgraded to version 1.8 alongwith all applicable exploits which have been added in this release. Included this time is the bsd_install.sh, which will set chmod on all applicable BSD compiled binaries.

WINAUTOPWN requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others' too for smooth working of exploits included in it.

winAUTOPWN and bsdAUTOPWN are available at http://winautopwn.co.nr


http://thehackernews.com/2012/04/winautopwn-v30-released-system.html

(Read More..)

Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer

.

http://thehackernews.com/2012/04/rootdabitch-version-01-multithreaded.html


r00tw0rm hacker "th3breacher!release Rootdabitch v0.1 ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack.


sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local brute forcer, using 10 passwords in 3 seconds. and works in background so you can leave it , when root is cracked it will email the user using /bin/mail .

All for this, you need to have a php shell/reverse shell/ssh access to the target to run thistool and run it as a normal user, Upload this script into it and give it the execution permission and execute the script like:

(Read More..)

Introducing phorkie: git based pastebin

.

http://cweiske.de/tagebuch/phorkie.htm

(Read More..)

Analyzing I/O performance

.

http://www.dbasquare.com/2012/04/18/analyzing-io-performance/

(Read More..)

PageSlide

.

a jQuery plugin which slides a webpage over to reveal an additional interaction pane
by Scott Robbin


http://srobbin.com/jquery-plugins/pageslide/

(Read More..)

Javascript Enlightmnet

.


This book is not about JavaScript design patterns or implementing an object-oriented paradigm with JavaScript code. It was not written to distinguish the good features of the JavaScript language from the bad. It is not meant to be a complete reference guide. It is not targeted at people new to programming or those completely new to JavaScript. Nor is this a cookbook of JavaScript recipes. Those books have been written.
It was my intention to write a book to give the reader an accurate JavaScript worldview through an examination of native JavaScript objects and supporting nuances: complex values, primitive values, scope, inheritance, the head object, etc. I intend this book to be a short and digestible summary of the ECMA-262, Edition 3 specification, focused on the nature of objects in JavaScript.
If you are a designer or developer who has only used JavaScript under the mantle of libraries (such as jQuery, Prototype, etc), it is my hope that the material in this book will transform you from a JavaScript library user into a JavaScript developer.

(Read More..)

Stored Cross Site Scripting via File Upload

.

http://www.ivizsecurity.com/blog/penetration-testing/stored-cross-site-scripting-via-file-upload/

(Read More..)

jQuery File Upload Demo

.


File Upload widget with multiple file selection, drag&drop support, progress bars and preview images for jQuery.
Supports cross-domain, chunked and resumable file uploads and client-side image resizing.
Works with any server-side platform (PHP, Python, Ruby on Rails, Java, Node.js, Go etc.) that supports standard HTML form file uploads.

(Read More..)

Generating Graphs From MySQL Table Data

.

http://www.techfounder.net/2012/04/18/generating-graphs-from-mysql-table-data

(Read More..)

HTML5 : Drag and Drop and Automatically Send to the Server

.

http://html5doctor.com/drag-and-drop-to-server/

(Read More..)

Advanced CodeIgniter Profiling With XHProf

.

http://net.tutsplus.com/tutorials/php/advanced-codeigniter-profiling-with-xhprof/

(Read More..)

QRCode Attack Vector

.


n nowadays QR codes are almost everywhere.You can see them in every product,in concert tickets even in advertisements on the streets.The main purpose of these QR Codes is to be used for marketing purposes or for people who would like to know more information about a specific product or service.However this wide use of QR codes can be an extra advantage for hackers and ethical penetration testers.Hackers they can use this QR codes in order to attack unsuspicious users and penetration testers can include this type of attack in their social engineering engagements.In this article we will examine this type of attack.
If you are conducting a penetration test and you want to include this type of attack the implementation is a very easy process.Of course there are many ways and combinations that you can try with this attack vector but in this article we will see how we can use the QR code to harvest credentials.The first thing that you will need is the fake website.So we will use the Social Engineering Toolkit to create that.Of course from the menu we will select the option 2 which is the Website Attack Vectors.

(Read More..)

iOS Wireframe

.

http://www.alterplay.com/assets/axure/

(Read More..)

Howto: Send The Content Of a Text File Using mail Command In Unix / Linux

.

http://www.cyberciti.biz/faq/email-howto-send-text-file-using-unix-appleosx-bsd/

(Read More..)

Properly Salting Passwords, The Case Against Pepper

.

http://blog.ircmaxell.com/2012/04/properly-salting-passwords-case-against.html

(Read More..)

140medley

.


140 medley

This is a micro-framework or a collection of small, helpful utilities for common javascript tasks.

Size

  • Source: 8.6 kb
  • Minified: 821 bytes
  • gzipped: 504 bytes

Features

  • templating - t();
  • local storage - s();
  • bind/unbind events - b();
  • create DOM elements - m();
  • DOM selector - $();
  • Get cross-browser xhr - j();
Inspired by 140bytes.

(Read More..)

Is CVE-2012-0507 the best toolkit to exploit Mac OS X?

.

http://community.websense.com/blogs/securitylabs/archive/2012/04/16/is-the-cve-2012-0507-the-best-toolkit-to-exploit-mac-os-x.aspx

(Read More..)

Backup your sandbox with XtraBackup

.

Today I tried to make incremental backups of a MariaDB instance in a MySQL sandbox with Percona XtraBackup.
I used the recently released XtraBackup 2.0. And of course there is documentation about making incremental backups. 

MySQL sandbox makes it easy to run many different MySQL versions on one machine. It does this by changing the port number, data directory, UNIX socket location and a whole lot more.

So I first started with a full backup and after that I used that backup as a base for the incremental backups. To do that I had to specify the port number which is 5522 and the username and password for the msandbox account. As MySQL uses a UNIX socket instead of a TCP connection if the hostname is localhost I specified 127.0.0.1 as hostname to force a TCP connection. That worked!

Then I created the incremental backup by using the --incremental option and the --incremental-basedir option to specify the location of the full backup. That also worked!



http://databaseblog.myname.nl/2012/04/backup-your-sandbox-with-xtrabackup.html

(Read More..)

Why a statement can be unsafe when it uses LIMIT clause?

.


MySQL 5.1 or newer can sometimes start throwing a strange message into an error log. The message states that a query was unsafe for binary logging along with some additional information. What does it mean? Is it a problem?
From time to time you might spot MySQL error log filling with the following warning:
“[Warning] Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT. The statement is unsafe because it uses a LIMIT clause. This is unsafe because the set of rows included cannot be predicted. Statement: DELETE FROM score WHERE user_id = 12345 AND created = ’2012-04-15′ LIMIT 1″
If binary logging is enabled and the log format is set to STATEMENT, MySQL generates such message when it considers that a query is ambiguous and could behave differently each time it executes against the same data set. Such situation could happen, for example, on a replication slave, or on a restored backup where binary logs are used for point-in-time recovery.

(Read More..)

Codeigniter Snippets Package for Sublime T. 2

.

http://marcomonteiro.net/wp/blog/2012/04/14/codeigniter-snippets-package-for-sublime-t-2/

(Read More..)

PngOptimizer

.

http://psydk.org/PngOptimizer.php

(Read More..)

Making signed requests with CodeIgniter

.


Recently we’ve done lots of backends for IOS apps, Flash sites, Facebook apps and such. In most cases, it’s just a matter of responding with JSON to a HTTP request, saving or fetching something from a datasource. The problem is that it’s fairly easy to sniff the request, change a few parameters and submit a forged request. Up until now, we’ve done authentication on an ad hoc basis, but last week i whipped up a simple CodeIgniter library to standardize the way we do this authentication. Here it is.
This is how to work it:
1. Place this file in application/libraries/
2. Load or autoload it
3. In your controller, use this to validate a request:
if($this->checksum->validate()){
    # keep calm and carry on
 }else{
    # respond that the checksum was bad
 }

http://earthpeople.se/labs/2012/04/signed-requests-with-codeigniter/

(Read More..)

QArt Codes

.


QR codes are 2-dimensional bar codes that encode arbitrary text strings. A common use of QR codes is to encode URLs so that people can scan a QR code (for example, on an advertising poster, building roofvolleyball bikinibelt buckle, or airplane banner) to load a web site on a cell phone instead of having to “type” in a URL.
QR codes are encoded using Reed-Solomon error-correcting codes, so that a QR scanner does not have to see every pixel correctly in order to decode the content. The error correction makes it possible to introduce a few errors (fewer than the maximum that the algorithm can fix) in order to make an image. For example, in 2008, Duncan Robertson took a QR code for “http://bbc.co.uk/programmes” (left) and introduced errors in the form of a BBC logo (right):

(Read More..)

Zoomoz.js

.

Make any webpage ZOOOM
http://janne.aukia.com/zoomooz/

(Read More..)

Weevils & AESHTTP

.

http://code.google.com/p/insecurety-research/

(Read More..)

weevely

.


Weevely is a stealth PHP web shell that simulate telnet-like connection. It is an essential tool for web application post exploitation, and can be used as stealth backdoor or as a web shell to manage legit web accounts, even free hosted ones.
Getting started with a quick Tutorial or show list of available Modules.
  • More than 30 modules to automatize administration and post exploitation tasks
    • Execute commands and browse remote filesystem, even with PHP security restriction
    • Audit common server misconfigurations
    • Run SQL console pivoting on target machine
    • Simple file transfer from and to target
    • Spawn reverse and direct TCP shells
    • Bruteforce passwords of target system users
    • And so on..
  • Backdoor communications are hidden in HTTP Cookies
  • Communications are obfuscated to bypass NIDS signature detection
  • Backdoor polymorphic PHP code is obfuscated to avoid HIDS AV detection

(Read More..)

Sabtu, 28 April 2012

Revamping My Development Toolchain

. Sabtu, 28 April 2012 .

http://benramsey.com/blog/2012/02/revamping-my-development-toolchain

(Read More..)

Senin, 16 April 2012

Chrome extensions for dummies

. Senin, 16 April 2012 .

http://www.jefvlamings.com/blog/chrome-extensions-for-dummies/

(Read More..)

Custom Post Type Helper Class

.

http://wp.tutsplus.com/tutorials/creative-coding/custom-post-type-helper-class/

(Read More..)

Tonedef : Phone Phreaking using Bluebox Demonstrated in India

.

http://thehackernews.com/2012/04/phone-phreaking-using-bluebox.html
https://play.google.com/store/apps/details?id=com.hacsoft.tonedef&hl=en

(Read More..)

Forensic FOCA - Power of Metadata in digital forensics

.

http://thehackernews.com/2012/04/forensic-foca-power-of-metadata-in.html

(Read More..)

grubpass : GRUB2 password setter

.

GRUB2 password setter 

(Read More..)

Minggu, 15 April 2012

Project: What's In A GIF - Bit by Byte

. Minggu, 15 April 2012 .

We sill start off by walking though the different parts of a GIF file. (The information on this page is primarily drawn from the W3C GIF89a specification.) A GIF file is made up of a bunch of different "blocks" of data. The following diagram shows all of the different types of blocks and where they belong in the file. The file starts at the left and works it's way right. At each branch you may go one way or the other. The large "middle" section can be repeated as many times as needed. (Technically, it may also be omitted completely but i can't imagine what good a GIF file with no image data would be.)

http://matthewflickinger.com/lab/whatsinagif/bits_and_bytes.asp

(Read More..)

Web Application Pen-testing Tutorials With Mutillidae

.

http://www.irongeek.com/i.php?page=videos/web-application-pen-testing-tutorials-with-mutillidae#detailed-look-at-linux-traceroute

(Read More..)

Sabtu, 14 April 2012

The MySQL “swap insanity” problem and the effects of the NUMA architecture

. Sabtu, 14 April 2012 .


The “swap insanity” problem, in brief

When running MySQL on a large system (e.g., 64GB RAM and dual quad core CPUs) with a large InnoDB buffer pool (e.g., 48GB), over time, Linux decides to swap out potentially large amounts of memory, despite appearing1 to be under no real memory pressure. Monitoring reveals that at no time is the system in actual need of more memory than it has available; and memory isn’t leaking, mysqld‘s RSS is normal and stable.
Normally a tiny bit of swap usage could be OK (we’re really concerned about activity—swaps in and out), but in many cases, “real” useful memory is being swapped: primarily parts of InnoDB’s buffer pool. When it’s needed once again, a big performance hit is taken to swap it back in, causing random delays in random queries. This can cause overall unpredictable performance on production systems, and often once swapping starts, the system may enter a performance death-spiral.
While not every system, and not every workload experiences this problem, it’s common enough that it’s well known, and for those that know it well it can be a major headache.

The history of “swap insanity”

Over the past two to four years, there has been an off-and-on discussion about Linux swapping and MySQL, often titled “swap insanity” (I think coined by Kevin Burton). I have followed it closely, but I haven’t contributed much because I didn’t have anything new to add. The major contributors to the discussion over the past years have been:
  • Kevin Burton — Discussion of swappiness and MySQL on Linux.
  • Kevin Burton — Proposed IO_DIRECT as a solution (doesn’t work) and discussed memlock (may help, but not a full solution).
  • Peter Zaitsev — Discussed swappiness, memlock, and fielded a lot of discussion in the comments.
  • Don MacAskill — Proposed an innovative (albeit hacky) solution using swap on ramdisk, and a lot more interesting discussion in the comments.
  • Dathan Pattishall — Describes how Linux behavior can be even worse with swap disabled, and proposes using swapoff to clear it, but no real solution.
  • Rik van Riel on the LKML — A few answers and proposal of the Split-LRU patch.
  • Kevin Burton — Discussion of Linux Split-LRU patch with some success.
  • Mark Callaghan — Discussion of vmstat and monitoring things, and a recap of a few possible solutions.
  • Kevin Burton — More discussion that Linux Split-LRU is essential.
  • Kevin Burton — Choosing the middle road by enabling swap, but with a small amount of space, and giving up the battle.
  • Peter Zaitsev — More discussion about why swapping is bad, but no solution.
Despite all the discussion, not much has changed. There are some hacky solutions to get MySQL to stop swapping, but nothing definite. I’ve known these solutions and hacks now for a while, but the core question was never really settled: “Why does this happen?” and it’s never sat well with me. I was recently tasked with trying to sort this mess out once and for all, so I’ve now done quite a bit of research and testing related to the problem. I’ve learned a lot, and decided a big blog entry might be the best way to share it. Enjoy.
There was a lot of discussion and some work went into adding the relatively new swappiness tunable a few years ago, and I think that may have solved some of the original problems, but at around the same time the basic architecture of the machine changed to NUMA, which I think introduced some new problems, with the very same symptoms, masking the original fix.


http://blog.jcole.us/2010/09/28/mysql-swap-insanity-and-the-numa-architecture/

(Read More..)

The history of supercomputers

.

http://www.extremetech.com/extreme/125271-the-history-of-supercomputers?print

(Read More..)

Javascript playground

.

http://javascriptplayground.com/

(Read More..)

Introducing: PasswordLib

.

http://blog.ircmaxell.com/2012/04/introducing-passwordlib.html

(Read More..)

freshy icons

.

http://karimartin.cz/#freshy

(Read More..)

DBAN HARD DRIVES WIPING UTILITY

.

http://www.sectechno.com/2012/04/13/dban-hard-drives-wiping-utility/

(Read More..)

WordPress and PayPal: An Introduction

.

http://wp.tutsplus.com/tutorials/creative-coding/wordpress-and-paypal-an-introduction/

(Read More..)

googleBBS/

.

http://www.masswerk.at/googleBBS/

(Read More..)

Setting millisecond-timeouts with curl

.

http://www.leftontheweb.com/message/Setting_millisecondtimeouts_with_curl

(Read More..)

New flushing algorithm in InnoDB

.

http://blogs.innodb.com/wp/2012/04/new-flushing-algorithm-in-innodb/

(Read More..)

Ospriet — An example audience moderation app built on Twitter

.

https://github.com/twitter/ospriet

(Read More..)

DTrace OEL update

.

http://blog.delphix.com/ahl/2012/dtrace-oel-update/

(Read More..)

Mosh mobile shell

.

http://mosh.mit.edu/#


Remote terminal application that allows roaming, supportsintermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.
Mosh is a replacement for SSH. It's more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.
Mosh is free software, available for GNU/Linux, FreeBSD, and Mac OS X.

(Read More..)

Toying With the HTML5 File System API

.

http://net.tutsplus.com/tutorials/html-css-techniques/toying-with-the-html5-filesystem-api/

(Read More..)

PHP: a fractal of bad design : kritik thd PHP

.

http://me.veekun.com/blog/2012/04/09/php-a-fractal-of-bad-design/

(Read More..)

CSS Sprites Revisited

.

http://coding.smashingmagazine.com/2012/04/11/css-sprites-revisited/

(Read More..)

How to speed up the Android Emulator by up to 400%

.

http://dev.blogs.nuxeo.com/2011/10/speeding-up-the-android-emulator.html

(Read More..)

WhatTheFont

.

http://www.myfonts.com/WhatTheFont/

(Read More..)

April 2012 Labs Release – Online DDL Improvements

.

http://blogs.innodb.com/wp/2012/04/labs-release-online-ddl/

(Read More..)

Meteor : Comet

.

http://www.meteor.com/

(Read More..)

Improved DBT-3 Results with MySQL 5.6.5

.

http://oysteing.blogspot.com/2012/04/improved-dbt-3-results-with-mysql-565.html

(Read More..)

Facebook PHP SDK and CodeIgniter for basic user authentication

.

http://www.dannyherran.com/2011/02/facebook-php-sdk-and-codeigniter-for-basic-user-authentication/

(Read More..)

InnoDB transportable tablespaces

.

http://blogs.innodb.com/wp/2012/04/innodb-transportable-tablespaces/

(Read More..)

[Live !] Slides from MySQL Conf 2012 and full Twitter stream

.

http://www.mysqlplus.net/2012/04/10/live-slides-mysql-conf-2012
http://box.com/perconalive2012/1/262276446#/perconalive2012/1/212680542

(Read More..)

MySQL conference HA tutorial resources

.

http://openlife.cc/blogs/2012/april/mysql-conference-ha-tutorial-resources

(Read More..)

UltraDefrag

.


UltraDefrag is a disk defragmenter for Windows, which supports defragmentation of locked system files by running during the boot process. It is easy to use without any complicated scripting or a huge load of configuration settings. You can filter the files processed by size, number of fragments, file name and path. You can terminate the process early by specifying an execution time limit.


http://sourceforge.net/projects/ultradefrag/

(Read More..)
 
{nama-blog-anda} is proudly powered by Blogger.com | Template by Agus Ramadhani | o-om.com