I have put another article on the main site…
Is Ubuntu slowly dying?
I have put another article on the main site…
mod_aspdotnet has been resurrected and a new version  released; read more here…
[Announce] (NON-ASF) mod_aspdotnet build 2006 released
Build 2.x.0.2006 is the first freestanding (non-ASF) release from the mod-aspdotnet project home, and includes a number of bug fixes since the final ASF-hosted release.
Note: the 2.2 builds do not seem to be working — it looks [under Dependency Walker] as if the build was linked, partially, against one of the Apache 2.0 libs.
The question is:
Why are “open source” [no pre-loaded OS] Dell PCs priced $50+ more than identical hardware with Vista pre-loaded?
As it turns out to be, the profit margins on the actual Dell box is close to zero after it reaches your door. Most of the profit comes from the spyware/adware/crippleware [crapware] that Dell ships with the box.
Another great business model has been created; bringing spamming directly to the desktop, included with the hardware for your convenience.
And round and round we go again: history repeating itself one more time.
So what’s the newest Microsoft FUD [Fear, Uncertainty, and Doubt] tactic these days…
Apparent, its getting a bunch of bloggers and security experts to regurgitate a statement containing the abstract fact that Apache has 33 reported “vulnerabilities” to IIS’ 3.
How exactly those numbers directly translate into a Web Server’s security mark, is of course left out.
Lets look at this issue a bit closer:
Apache serves 2/3rd of the internet. It has thousands of developers and companies around the world working with the codebase: constantly securing, improving, developing, and moving Apache forward.
This is considered to be a *bad thing* by the Micosoft camp? Vulnerabilities should not be looked for, nor reported and fixed.
So I have just one question: how many vulnerabilities would be reported for IIS if the source code was open?
I think it might also be prudent to…
- Break down the numbers of vulnerabilities for Apache core and specific modules.
- Reflect on the seriousness of the reported vulnerabilities… Is this just theoretical, of insignificant nature, has an exploit been developed [how about 3 years after the fact]?
- The time period between a vulnerability being reported and fixed.
- How many of the reported vulnerabilities did you actually needed to respond to?
Throwing out abstract statistics has no purpose other than spreading FUD.
Instead, why not report on the merits of IIS itself… Specifically, on the improvements and features of IIS 6 and 7.
I’m ashamed to say that its actually been quite a long time since I have written a new article for DeveloperSide.NET… My time has been taken up with other work.
Time-to-time, I have been questioned on the specifics of increasing the performance of an Apache-based Web Server, specifically our Web-Developer Server Suite. Not that the Suite itself, or the end-users, *need* an extra boost; the term *want* describe this odd, yet very familiar, phenomena much better. And one of the things I have learned is that you have to give the people what they _want_, and not what they _need_…
Trying to correct this oversight, I have put up an article that’s ready to squeeze every last bit of performance out of a Server:
Apache Performance Tuning
As all our Articles, and Guides, are works-in-progress, expect for some changes and updates to occur [I even go back and update/rewrite old blog posts].
“The first commercially viable quantum computer.”
And the winner is… Helix, for both Windows and Linux.
I was reading my copy of the Unix System Administration Handbook this morning, and came across this passage at the very end…
“We produced the first edition of this book with the UNIX troff package. For the second edition, we used a Macintosh. We produced this third edition entirely on Microsoft Windows 95, 98, and 2000. Oh, such delight! We’ll never touch UNIX again.”
I found the excerpt to be a bit humorous, considering the source [the bible of Unix Administration]. And how Linux is sometimes *pushed* on Windows users, by some. [guilty as charged... but I have changed my ways, I promise.]
Personally, I would rather use the tools that get the most amount of work done for the least amount of effort.
No, it’s not easter, just Valentine’s Day.
Append the URL of any PHP script with a “?=” and the following codes; to drop script output and display…
Zend Engine 2 Logo:
Another PHP Logo:
The PHP Logo is also replaced with an image of a developer’s dog when the date is the 1st of April.
Perhaps in a few years that will be the headline.
In the mean time, lighttpd does look very promising…
“Security, speed, compliance, and flexibility–all of these describe LightTPD which is rapidly redefining efficiency of a webserver; as it is designed and optimized for high performance environments.”
“lighttpd powers several popular Web 2.0 sites like YouTube, wikipedia and meebo. Its high speed io-infrastructure allows them to scale several times better with the same hardware than with alternative webservers.”
The configuration file for lighttpd looks more like source code, rather than a typical ini file. One feature that I am particularly impressed with, that has no Apache counterpart, is the conditional configuration.
Lets hope this project stays afloat. Competition is a good thing, for the end-user.
Also, take a look at the LiteSpeed Web Server.