"LFY March 2011" tag
Website development is easy using Rails plugins

Rails Plugins — Making Website Development Easy!

This article is a tutorial on how to use Rails plugins for pagination, authentication and file attachments. It is aimed at readers with a basic knowledge of Ruby on Rails programming. A plugin…

Search

The Needle and the Haystack: Exploring Search Models, Part 2

In the previous article, we demystified some search-related jargon, and learned how the humble Grep can be used to simulate a Boolean-model search engine. In this concluding article on the subject, let us…

Locked!

Securing Apache, Part 7: Fool-proofing the Server OS

Moving deeper into Web application and Apache security, let’s now focus on OS commanding attacks, and those that lead to the disclosure of crucial information and server directory paths. The attacks described below…

Let us back track for a while

Digital Forensic Analysis Using BackTrack, Part 1

Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a few years ago. However, with the growing incidence of…

DeliGate, a Proxy

DeleGate — A Multi-platform, Multipurpose Proxy Server

A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In this article, we will briefly discuss one of them,…

lighttpd + SQLite

lighttpd & SQLite: A Lightweight Web Server and Database Platform

This article demonstrates the setting up of a lightweight Web server and database platform, using the lighttpd Web server and the SQLite database management system (DMS) instead of the LAMP stack. These two…

Verify firewall security

Advanced Nmap: Scanning Firewalls Continued

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead to various vulnerabilities. Based on the scan results, several…

I Grok!

Exploring Software: Getting a Hang of Zope’s Grok

According to Wikipedia, “to grok” is to share the same reality or line of thinking with another physical or conceptual entity. For example, to say that you “know” LISP is simply to assert…

Buggy Pentium processor

Joy of Programming: Bug Hunt

Every programmer knows that debugging is akin to a detective’s work. In this column, we’ll cover this “bug hunt” process with an example of how the Intel Pentium processor bug was discovered. Software…

Show me the money!

FreedomYUG: Get Out of Your Own Way

How to Successfully Earn a Living with FOSS — Part 2 Let’s start with a simple example. You convince a friend, colleague, or a client to migrate from Windows to GNU/Linux. You wipe…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.