"http" tag

Demystifying the Mobile Backend-as-a-Service

Mobile and Web app developers now have reason to cheer, with the evolution of the Mobile Backend-as-a-Service (MBaaS) model. This article takes you through its intricacies. Abbreviations like IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) and…

Our little app in action

Getting Started with HTML5 WebSockets

Ever felt that in the so called two-way Web, updating Web pages in real-time is a pain? Well, the HTML5 specifications took care of that in a big way. Introducing WebSockets — the…

SPEED!

Web Acceleration with Varnish 3.0

In this article we’ll setup a ready-to-deploy WordPress-compatible Varnish service as our HTTP reverse caching proxy, and have it cache the desktop and mobile themes separately. Our original WordPress recipe had a place…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

The cop's patrolling

Guard Your Network with IPCop, Part 1: Installation Basics

The classic version of IPCop 1.4.20, which was released on July 24, 2008, was immediately upgraded to the 1.4.21 ISO installer. The much awaited version 2.0 has been out since September 23, 2011….

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

It's time we file

Storage Management using Openfiler, Part 3

The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1 data storage, with some important setup instructions and troubleshooting…

Tightened Security

Securing Apache, Part 11: Logs, et al.

In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways. Configuring a system to be secure is indeed a key task,…

All checks in place!

Securing Apache, Part 10: mod_security

Right from Part 1 of this series, we’ve covered the major types of attacks being done on Web applications — and their security solutions. In this article, I will reveal the tremendous capabilities…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.