Open Source Software Technical Articles

Want the Best of the Wazi Blogs Delivered Directly to your Inbox?

Subscribe to Wazi by Email

Your email:

Connect with Us!

Current Articles | RSS Feed RSS Feed

How to set up and use RANCID under CentOS


RANCID (Really Awesome New Cisco ConfIg Differ) is a powerful tool for keeping track of changes in the configuration of network devices, not only from Cisco, but also vendors such as Juniper, Catalyst, and Foundry. You can use RANCID to view configuration files, compare changes in different versions of configuration, and save a historic record of configuration instances.

Getting started with ocPortal


Looking for a powerful tool to help create your next-generation website? The ocPortal content management system (CMS) lets you build sites with advanced features like photo galleries, news, events, and social networking. It follows accessibility standards, handles search engine optimization, and provides you with solid security.

Create a CRUD PHP application easily with Yii and Giix


CRUD (create, read, update, and delete) applications allow you to manage the entries in your database tables. You can create CRUD applications to easily manage existing database tables with the popular Yii framework and one of its extensions, Giix.

Get better PHP performance with HipHop Virtual Machine


Facebook (perhaps you've heard of it) created HipHop Virtual Machine (HHVM) to run its PHP code. It's faster than any other PHP interpreter, including the leader in most benchmarks, FastCGI Process Manager.

How to locate and clean malicious code on your website


If your website gets hacked, it can affect both your income and your reputation. Keeping your web space malware-free requires daily effort. In this article, learn how to locate infected files, check server logs, clean your files, and take measures to minimize the chances of being hacked again.

How to securely administer MySQL over SSH


By facilitating secure access to remote systems, SSH makes systems administrators' jobs easier. SSH provides data communication, remote command-line login, and remote command execution, all over a secure channel. Database administrators can take advantage of SSH to manage a MySQL installation remotely.

Optimize MySQL server performance with user resource limits


MySQL lets you configure server resource limits on per user account basis. This feature helps you maximize system availability in situations where different users (possibly multiple business clients) share a single environment and none should be allowed to overload it. You can also use it to prevent a nonessential process from monopolizing limited MySQL resources.

How to repair a hacked or broken WordPress installation


A page on your WordPress site has been defaced, or you've discovered a new directory that you never created. You've been hacked! Don't panic – no matter how bad things may seem, if you take some steps to prepare before you have a problem, you can recover easily.

How to use PostgreSQL Foreign Data Wrappers for external data management


Often times, huge web projects use multiple programming languages and even multiple databases. While relational database management systems (RDBMS) are common, they have limitations when it comes to the management of highly variable data. For such applications, NoSQL databases are a better alternative. The PostgreSQL RDBMS now provides Foreign Data Wrappers (FDW) that let PostgreSQL query non-relational external data sources.

How to apply PCI data security standards to Linux data centers


The Payment Card Industry (PCI) data security standards are a set of best practices and requirements established to protect sensitive data such as payment card information. Following these standards is mandatory for merchants dealing with payment cards, but any responsible organization can benefit by using them to enhance information security.

All Posts