Sysadmins

Cyber Attacks Explained: Cryptographic Attacks

Cryptographic solutions are used to encrypt data transmission over wireless or wired protocols. Unfortunately, these techniques have proved to be vulnerable to attacks and data can be stolen. This article explores the various…

Cyber Attacks Explained: Wireless Attacks

Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these benefits comes a threat: wireless networks are…

Learn the Art of Linux Troubleshooting

Here are some valuable tips to help you find important system files in RHEL 5, which get deleted by accident. Everything seems fine when your Linux machine works just the way you want…

Introducing Samba 4 Now, Even More Awesomeness

Samba 4 has been in development for a long time but an official first release is imminent, the developers say. Its biggest feature is Active Directory Server support, which removes the last hurdle…

Playing Hide and Seek with Passwords

Passwords are used in many ways for security in computers, from BIOS management to logging in to your user account; from accessing hard disk contents, to restricting access to specific services. For Linux,…

Cyber Attacks Explained: The Botnet Army

This article covers sophisticated botnet attacks, whereby the attacked computer system becomes an attacker itself. Systems administrators and senior technology management staff that are aware of the modus operandi of botnets are best…

Deploying Java Web Applications on CloudSwing Open PaaS

Development and deployment are slow in traditional environments due to issues with team synchronisation across regions, software version and licensing management (for proprietary products), backup and disaster-recovery management, and access to the required…

Cyber Attacks Explained: The Man In The Middle, Part-8

Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusion—the Man In The Middle (MITM) attack, which is widely favoured by attackers….

VANET Simulation Using FOSS

As the name suggests, VANET is a network wherein the nodes are vehicles equipped with on-board units (OBU) for networking. A VANET may also have Road-Side Units (RSU), which are static infrastructure nodes…

Sending Emails From Terminal Using Gmail Account

Linux terminal is one of the coolest tools I’ve ever come across. If you are also a fan of the terminal, and are a Gmail user, you should like this article. Note: I’ve…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.