100SILEX, de 0 100 s: Commonly
1333 Download OpenStreetMap data OSM
Commonly Used Formats europe-latest.osm.pbf, suitable for Osmium, Osmosis, imposm, osm2pgsql, mkgmap, and others. This file was last modified 19 hours ago and contains all OSM data up to 2013-05-28T18:59:04Z. File size: 10.3 GB; MD5 sum: c97ac9a7c90bc7791893f19fe9e7e3a3. europe-latest.shp.zip is not available for this region; try one of the sub-regions. Other Formats and Auxiliary Files europe-latest.osm.bz2, yields OSM XML when decompressed; use for programs that cannot process the .pbf format. This file was last modified 5 days ago. File size: 14.9 GB; MD5 sum: 087b5f040c89d6d64ea18503b2723d61. .poly file that describes the extent of this region. .osc.gz files that contain all changes in this region, suitable e.g. for Osmosis updates raw directory index allowing you to see and download older files

720 Common Security Mistakes in Web Applications - Smashing Magazine
Web application developers today need to be skilled in a multitude of disciplines. It’s necessary to build an application that is user friendly, highly performant, accessible and secure, all while executing partially in an untrusted environment that you, the developer, have no control over. I speak, of course, about the User Agent. Most commonly seen in the form of a web browser, but in reality, one never really knows what’s on the other end of the HTTP connection. There are many things to worry about when it comes to security on the Web. Is your site protected against denial of service attacks? Is your user data safe? Can your users be tricked into doing things they would not normally do? Is it possible for an attacker to pollute your database with fake data? Is it possible for an attacker to gain unauthorized access to restricted parts of your site? Unfortunately, unless we’re careful with the code we write, the answer to these questions can often be one we’d rather not hear. We’ll skip over denial of service attacks in this article, but take a close look at the other issues. To be more conformant with standard terminology, we’ll talk about Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Phishing, Shell injection and SQL injection. We’ll also assume PHP as the language of development, but the problems apply regardless of language, and solutions will be similar in other languages.

464 Ksplice » Attack of the Cosmic Rays! - System administration and software blog
It’s a well-documented fact that RAM in modern computers is susceptible to occasional random bit flips due to various sources of noise, most commonly high-energy cosmic rays. By some estimates, you can even expect error rates as high as one error per 4GB of RAM per day! Many servers these days have ECC RAM, which uses extra bits to store error-correcting codes that let them correct most bit errors, but ECC RAM is still fairly rare in desktops, and unheard-of in laptops. For me, bitflips due to cosmic rays are one of those problems I always assumed happen to “other people”. I also assumed that even if I saw random cosmic-ray bitflips, my computer would probably just crash, and I’d never really be able to tell the difference from some random kernel bug. A few weeks ago, though, I encountered some bizarre behavior on my desktop, that honestly just didn’t make sense. I spent about half an hour digging to discover what had gone wrong, and eventually determined, conclusively, that my problem was a single undetected flipped bit in RAM. I can’t prove whether the problem was due to cosmic rays, bad RAM, or something else, but in any case, I hope you find this story interesting and informative.

213 All Design Patterns | Open Source Design Pattern Library
Fluid is an open-source software community Fluid builds user interfaces, designs commonly used interactions, teaches others how to build good user-centred designs, and works with other software projects to integrate our solutions into their applications.

101 - 201