"Cisco" tag
It pays to be a Linux 'expert'

IT Pays To Be a Linux Expert

The IT industry is expected to hire many more Linux professionals this year, and to take extra measures to retain Linux talent within organisations. LINUX For You digs into their pockets and finds…

IPsec VPN Penetration Testing

IPsec VPN Penetration Testing with BackTrack Tools

This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal network. IPsec is the most commonly used technology for…

Orisys team

FOSS Solutions for Call Centres that’s 10 Times Cheaper

OrisysIndia, a Kerala-based IT solutions provider, is using open source to deliver advanced communication solutions to call centres in Kerala at a mere 10 per cent of the cost of similar proprietary solutions….

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

Linux Virtualisation Roundup

VMWare Player, VirtualBox, KVM: Finding Virtualisation Software that Fits

This article is intended to guide users in choosing the best virtualisation solution for themselves. According to Wikipedia: “Virtualisation, in computing, is the creation of a virtual (rather than actual) version of something,…

The place for Network Security Monitoring

Best Practices in Network Security Monitoring

This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that help achieve this. It is imperative for an IT…

Load balancing?

Layer 7 Load Balancers

Linux has proven itself as a rock-solid operating system platform for industry-leading software appliances and applications, one of which is for load-balancing. As global Internet traffic increases, it demands an increased throughput from…

SQL or No?

Up Close and Personal with NoSQL

Aimed at Web developers, DBAs, programmers, et al., this article covers the basic concepts about NoSQL databases, the different types and their features. When you think of choosing a database for your application…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.