Sysadmins

Test Your Troubleshooting Skills With Trouble-Maker

Trouble-Maker, as the name suggests, is a Linux tool that, when installed in a system, randomly selects a problem from its list and actually creates it on the system. The idea behind using…

LVM Visual

Manage Storage Like a Pro with LVM

Disk storage space is always at a premium. No matter how much space one has, it always seems to shrink. In this article, the author suggests a solution to this problem with the…

Android-robot

When Android Invades the Enterprise…

This article explores the challenges in managing handheld devices based on the Android platform that are being used in an enterprise. It also explains the complexities of creating an enterprise-ready Android platform, which…

Sheshagiri-Anegondi

‘The security threat on the cloud is now passe’

With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a new multi-tenant architecture, by which the company attempts to…

Setting Up OpenAM for Web Authentication

OpenAM provides a system for integrating diverse Web applications-to share common authentication and authorisation systems. It can protect applications running on any Web or application server. With a centralised login for all applications,…

a-man-chatting-with-online

Set Up Your Own Chat Server

Chatting and Instant Messaging applications are used regularly at workplaces and for personal reasons. So how about setting up your own chat server? This article shows you how… Let’s use Openfire, a cross-platform, open…

naptol

FOSS Helps Naaptol Take E-Commerce to New Heights!

Naaptol, a leading virtual home shopping platform, grew phenomenally by placing its bets on open source technology. Adopting the FOSS model not only helped the e-commerce giant cut down on its early investments,…

Top 10 Open Source security tools

This article covers popular Open Source security tools which are used as a layered approach for securing your network. The layered-security approach centers on maintaining appropriate security measures and procedures at five different…

Analyse Your Network Packets with LibPCAP

Data on a network flows in the form of packets, which are entities that carry your data across the network. These packets are routed from one router to another by intelligent nodes. LibPCAP…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.