"ACK" tag
The art of crafting

Cyber Attacks Explained: Packet Crafting

Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

It's concurrent servers time

The Socket API, Part 3: Concurrent Servers

In this part of the series, we will learn how to deal with multiple clients connected to the server. Welcome to another dose of socket programming! Till now, we’ve created servers that are…

Firewall Scan

Advanced Nmap: Scanning Firewalls

After four articles on Nmap [1, 2, 3 & 4], which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion techniques, etc, it is time…

Mapping a network

Learning Nmap: The Basics

Nmap, the network mapping tool, is the starting point when analysing any network. It is an exciting tool — compact and power-packed. This article looks at the range of functions and options it…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.