When we get approached for quote requests we always do some due diligence on the company making the request. This generally takes the form of checking their recent accounts filed at Companies House and researching their website and wider online presence. There have been several occasions recently where I have checked out a company's website, seen they have a Twitter account, browsed to it on Twitter and simply thought 'Wow!'.
Part three of my four part Capistrano series covers adapting the Ruby based Capistrano deployment tool for use with LAMP websites. If you missed the previous instalments of this Capistrano series then you can read parts one and two via our blog. This is a monumentally techie blog post which isn't for the faint hearted!
OK, time for part two in my four part Capistrano series of blog posts. In case you missed it you can find part one here. This is a techie post aimed at experienced website developers so consider yourself forewarned if you read on.
I decided to write this post based on my own experience of trawling Google for help bending Capistrano to my will and finding the lack of a joined up advanced tutorial frustrating. Over the course of this and the next part in my Capistrano series I will write a detailed tutorial going from installation of Capistrano to being in a position to deploy your website using the 'cap deploy' command. There are other tutorials that achieve this but none that:
A large amount of Twitter's rise to fame is owed to celebrity usage. Prior to Twitter, mass communication with the world's most famous and feted people was only available indirectly via traditional media. With most interviews being carefully controlled the general public only ever saw the carefully styled public persona of a celebrity and not the real person. Twitter changed all that by allowing direct, and importantly, two way interaction between celebrities and the general public. The appeal of this newfound closeness had people flocking to Twitter in their droves.
Recently I did some consultancy work with a client who was used as a second hop in a DNS amplification attack and I've taken a bit of an interest in this phenomenon. So much interest in fact that I ran some experimentation of my own as to how easy it is to carry out this kind of attack. The results of my experiment follow in the rest of this post. I should forewarn that this is an extremely techie blog post so isn't for the faint hearted!
Please note that since Capistrano 3's release in October 2013 this Capistrano 2 based tutorial series has been superseded by an updated Capistrano 3 tutorial series.
John Lennon once said that 'Life is what happens to you when you're busy making other plans' and this week's blog post is good evidence of that.
Hello everyone and welcome to what will hopefully be the first in a long line of blog posts from the Zodiac Media team.
The aim of this blog is to share our knowledge, experiences and opinions on internet and technology related topics with the wider online community. In particular we will be writing with small and medium-sized businesses in mind as they comprise the majority of our client base. Posts are likely to fall into two main categories, 'techie' and 'non-techie'. We'll 'tag' blog posts accordingly so you don't waste your time.