Prashant Phatak
Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

uhh, not the rootkits again

Chkrootkit — Eliminate the Enemy Within

Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a few detection options. This article continues on the same…

Rootkits: The Enemy Within

Rootkits: The Enemy Within

While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a Linux distribution makes it vulnerable to programmatic and manual…

The place for Network Security Monitoring

Best Practices in Network Security Monitoring

This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that help achieve this. It is imperative for an IT…

Securing Database Servers

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider implementing security at a network layer to protect the…

Load balancing?

Layer 7 Load Balancers

Linux has proven itself as a rock-solid operating system platform for industry-leading software appliances and applications, one of which is for load-balancing. As global Internet traffic increases, it demands an increased throughput from…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.