Sysadmins

Deploying Java Web Applications on CloudSwing Open PaaS

Development and deployment are slow in traditional environments due to issues with team synchronisation across regions, software version and licensing management (for proprietary products), backup and disaster-recovery management, and access to the required…

Cyber Attacks Explained: The Man In The Middle, Part-8

Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusion—the Man In The Middle (MITM) attack, which is widely favoured by attackers….

VANET Simulation Using FOSS

As the name suggests, VANET is a network wherein the nodes are vehicles equipped with on-board units (OBU) for networking. A VANET may also have Road-Side Units (RSU), which are static infrastructure nodes…

Sending Emails From Terminal Using Gmail Account

Linux terminal is one of the coolest tools I’ve ever come across. If you are also a fan of the terminal, and are a Gmail user, you should like this article. Note: I’ve…

Bandwidth Throttling with NetEM

Bandwidth Throttling with NetEM Network Emulation

NetEM (Network Emulation) provides functionality for testing protocols, by emulating the network properties of wide-area networks. This article describes the use of NetEM in benchmarking the performance of a Web application, simulating Internet-like…

The art of crafting

Cyber Attacks Explained: Packet Crafting

Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward…

Your First Site-to-Site VPN

Guard Your Network with IPCop, Part 5: Your First Site-to-Site VPN

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles covered six important add-ons: Advanced Proxy, URL Filter, Update Accelerator, Calamaris, Block Outgoing Traffic and Zerina….

It's so big!

Impact of Big Data on Enterprise Integration

This article explains the new challenges in enterprise integration caused by the advent of big data, and presents some approaches to overcome them. Big data is the latest buzz-word in the industry. At…

About time we guarded this network!

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina Add-on

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance IPCop’s functionality: Advanced Proxy, URL Filter, Update Accelerator, Calamaris…

Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.