"LFY January 2011" tag
Track the DNA of your code!

Do You Know the Trick to Track Your Code’s DNA?

You can now manage the source code for software-related product development in your organisation, using the Black Duck Suite, which among other capabilities, generates an alert each time a developer infringes a licensing…

Kernel C Extras

Device Drivers, Part 3: Kernel C Extras in a Linux Driver

This article in the series on Linux device drivers deals with the kernel’s message logging, and kernel-specific GCC extensions. Enthused by how Pugs impressed their professor in the last class, Shweta wanted to…

Secured!

Securing Apache, Part 5: HTTP Message Architecture

In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article focuses on attacks exploiting the HTTP message architecture in…

3D plot in colour

Plotting is Fun with GNUPlot

This article explores the use of GNUPlot for scientific plotting, along with examples. While strings and pages of data seem cryptic, a plot reveals the entire data flow at a glance. Interpretation suddenly…

Handling interrupts

Handling Interrupts

In my last article, we explored the concept of interrupts and how they catch the CPU’s attention. In this article, we will look at what happens after an interrupt occurs. Let’s start by…

VirtualBox on a browser

phpVirtualBox — Accessing VirtualBox from a Browser

This article introduces phpVirtualBox, an open-source, AJAX and PHP-based implementation of the Oracle VirtualBox user interface

Scan time!

Advanced Nmap: FIN Scan & OS Detection

Nmap is a fantastic tool, and I just can’t refrain from praising it, every time I use it. The earlier articles in this series have detailed many important Nmap scan types. Let us…

Wi-Fi penetration testing

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage and awareness, hackers (or, rather, crackers) are exploiting the…

Puppet resource types

Puppet Data Centre Automation Solution, Part 3: Resource Types & Example Configs

The previous article in this series focused on creating users, groups and files (based on home directories). Let’s now look at the various types of resources provided by Puppet, by default, and at…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.