"LAN" tag
Vineet-Taneja,-country-head,

“Samsung tweaks Android to enhance the user experience”

After the immensely successful Galaxy Tab 2 series, Samsung has launched its successor-the Galaxy Tab 3 devices-in the Indian market. The company is well aware that the Android platform can take it places….

The Making of the SUSE Brand in India

SUSE dreamt of making it big in India and has succeeded in doing so, over a period when people were still apprehensive about open source. Read on to learn how SUSE’s success story…

Use CoffeeScript To Write Your JavaScript

JavaScript has become the lingua franca of the Web and has gained a lot of popularity in recent years. Many frameworks and technologies have been inspired by JavaScript, and it now powers most…

Get Your Hands On CODE VALIDATOR

We bring you an interesting article where three final year students from Thiagarajar college of Engineering (TCE), Thiruparankundram, Tamil Nadu have designed an exciting web based tool ‘Code Validator’  (CV). Know more about…

Restore Partitions Over the Network Using Clonezilla

Clonezilla is back-up and restore software that is a powerful alternative to Symantec’s famous, yet expensive, commercial software Norton Ghost. Do you often format your partition and reinstall Windows along with other software…

Bandwidth Throttling with NetEM

Bandwidth Throttling with NetEM Network Emulation

NetEM (Network Emulation) provides functionality for testing protocols, by emulating the network properties of wide-area networks. This article describes the use of NetEM in benchmarking the performance of a Web application, simulating Internet-like…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Rootkits: The Enemy Within

Rootkits: The Enemy Within

While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a Linux distribution makes it vulnerable to programmatic and manual…

Firewall Scan

Advanced Nmap: Scanning Firewalls

After four articles on Nmap [1, 2, 3 & 4], which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion techniques, etc, it is time…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.