Building a Java snap by example | Ubuntu

Following up on the previous example of building a rust and C based snaps, I thought we’d take a look at bundling a Java application as a snap. In this example we’ll use an open source game called “Shattered Pixel Dungeon“. It’s a little more complex than some more common Continue Reading

2.15.3 Released!

This minor release addresses some bugs which arose as a result of the previous release – 2.15.2 – which was a security release. The following issues have been resolved with this release: Security Disable unserializing of classes. We should unserialize only array data (PHP 5.x) Bugs Enhancements A huge thank Continue Reading

A Breakthrough in Usability – Automatic Node Provisioning

As announced in the previous blog post, MySQL InnoDB Cluster just got a very much requested feature which makes a complete, out-of-the-box, easy-to-use and versatile HA solution – Automatic Node Provisioning. InnoDB cluster users can now rely on it for every single step of cluster deployment and management. From instance configuration Continue Reading

Group Replication – Consistent Reads Deep Dive

On previous posts about Group Replication consistency we: introduced consistency levels; explained how to configure the primary failover consistency; presented how to configure transaction consistency levels to achieve the consistency required by your applications. In blog 3. we presented the consistency levels: EVENTUAL, BEFORE, AFTER and BEFORE_AND_AFTER; their scopes: SESSION, Continue Reading

BlueBorne: Technical Insight

(BlueBorne background: read our previous post from Aamir Lakhani here) I have watched the BlueBorne demos and read the technical paper – it was tough! I am amazed at how the researchers managed to exploit several vulnerabilities to turn them into a PoC attack. My comments below. BlueBorne does not “spread” (as such) BlueBorne affects devices Continue Reading

WordPress 4.8.2 Security and Maintenance Release

WordPress 4.8.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.8.1 and earlier are affected by these security issues: $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is Continue Reading

WordPress 4.7.5 Security and Maintenance Release

WordPress 4.7.5 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.4 and earlier are affected by six security issues: Insufficient redirect validation in the HTTP class. Reported by Ronni Skansing. Improper handling of post meta Continue Reading

WordPress 4.7.3 Security and Maintenance Release

WordPress 4.7.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.2 and earlier are affected by six security issues: Cross-site scripting (XSS) via media file metadata.  Reported by Chris Andrè Dale, Yorick Koster, and Simon P. Briggs. Continue Reading

WordPress 4.7.2 Security Release

WordPress 4.7.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.1 and earlier are affected by three security issues: The user interface for assigning taxonomy terms in Press This is shown to users who do Continue Reading

Develop Plesk Extensions Series: Create extension stub and IDE project

In the previous part (Install a local version of Plesk), I showed you how to install Plesk locally in a virtual machine. In this part we will create an extension stub with the help of the command line and add this extension into your favorite IDE (Integrated Development Environment), like Continue Reading