This is a guest post by Michael Austin, who writes his blog at www.mikazo.com. Identification and authentication are concepts that appear very often when discussing the subject of information security. Each has a different meaning, and both are often confused with one another. Identification and authentication usually both take place at the same time, for […]
If you’re anything like me, then you’ll spend a large part of your time working at the command line. I often find it easier to use some things in the shell then as a GUI. Take Subversion for example. While the rest of my team use TortoiseSVN, I’m constantly trying to evangelise the command line […]
Here’s my latest screencast, showing you how to stress test your website and web applications using JMeter.