Bookmarks for 9 dic 2014 through 11 dic 2014

These are my links for 9 dic 2014 through 11 dic 2014:

  • The WordPress wp-config File: A Comprehensive Guide – WPMU DEV – The WordPress configuration file, also known as wp-config.php, is most frequently used to set up a database connection and is then forgotten. Despite its neglected nature, it is a powerhouse of features and opportunities for optimization.
  • Open source ticket manager Brimir – Declutter your support inbox. Provide support with a team of different agents and a perfect overview of all your communication. All using an open souce product!
  • ivaldi/brimir – Brimir is a simple helpdesk system that can be used to handle support requests via incoming email. Brimir is a rather simple Ruby on Rails application. The only difficulty in setting things up is how to get incoming email to work.

Bookmarks for 23 gen 2014 through 24 gen 2014

These are my links for 23 gen 2014 through 24 gen 2014:

  • Pancake HTTP Server – What is Pancake? Pancake is a lightweight and modern HTTP server that comes with its own PHP Server API and interfaces for FastCGI and AJP13. With its modern server architecture Pancake is capable of handling very high concurrency loads along with many other features – try it out!
  • GitLab: Self Hosted Git Management Application – GitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews. GitLab allows you to keep your code secure on your own server manage repositories, users and access permissions communicate through issues, line-comments and wiki pages perform code review with merge requests GitLab is powered by Ruby on Rails completely free and open source (MIT license) used by more than 25.000 organizations to keep their code secureGitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews.
  • Hardening the Linux server – Summary:  Servers — whether used for testing or production — are primary targets for attackers. By taking the proper steps, you can turn a vulnerable box into a hardened server and help thwart outside attackers. Learn how to tighten Secure Shell (SSH) sessions, configure firewall rules, and set up intrusion detection to alert you to possible attacks on your GNU/Linux® server.