"DOS" tag
Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect our infrastructure from them? This article is about how…

Inside the hard drive

Device Drivers, Part 14: A Dive Inside the Hard Disk for Understanding Partitions

This article, which is part of the series on Linux device drivers, takes you on a tour inside a hard disk. “Doesn’t it sound like a mechanical engineering subject: The design of the…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

Dennis MacAlistair Ritchie

Joy of Programming: The Legacy of C

Dennis Ritchie died on the 8th of October 2011, at the age of 70. His lasting contributions to computing include creating the C language, and co-creating the UNIX operating system. In his memory,…

Accessing hardware in Linux

Device Drivers, Part 7: Generic Hardware Access in Linux

This article, which is part of the series on Linux device drivers, talks about accessing hardware in Linux. Shweta was all jubilant about her character driver achievements, as she entered the Linux device…

A Recap

Advanced Nmap: A Recap

This final article in the series consolidates information from the previous articles, looks at NMap’s future possibilities, and at the new tools from the development team. Beginning its life as a simple port-scanner,…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.