"encryption" tag
Areca Backup

Looking for a Free Backup Solution? Try Areca

Let’s take a look at Areca Backup, which is simple, easy to use, versatile, and makes interacting with your backups easy. Areca Backup is an open source file backup utility that comes with…

A Peek Into Storage Solutions

Open source storage is similar to all other commercial storage products and can fulfill business needs like building Storage Area Network or Network-Attached Storage, file synchronisation and array clustering. We can develop and…

Sheshagiri-Anegondi

‘The security threat on the cloud is now passe’

With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a new multi-tenant architecture, by which the company attempts to…

Open Source Access to MS Exchange Server Using DavMail

This article introduces DavMail and demonstrates its importance in corporate scenarios for accessing mail from MS Exchange Server. Many enterprises use Microsoft Exchange for corporate e-mail; usually, there’s no avoiding it. While Exchange…

Encrypt your data

TrueCrypt — Learn the Art of Encryption

When did you last feel that you ought to have secured that important file so nobody else could view it without your permission? Ever lost your pen drive with loads of family photos…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

An identity for the junt

Aadhaar: A Testimony to Success of FOSS in India!

It is heartening to see how FOSS is powering one of India’s most prestigious and mammoth e-governance initiatives — the Aadhaar project from the Unique Identification Authority of India. For those of you…

Tightened Security

Securing Apache, Part 11: Logs, et al.

In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways. Configuring a system to be secure is indeed a key task,…

Wi-Fi penetration testing

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage and awareness, hackers (or, rather, crackers) are exploiting the…

Cryptography and Steganography with Python

Cryptography and Steganography with Python

Steganography and cryptography have been widely used to hide sensitive information. This article offers a brief introduction to how both these methods can be used together. The implementation uses Python with the Stepic…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.