"LFY March 2012" tag
About time we guarded this network!

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina Add-on

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance IPCop’s functionality: Advanced Proxy, URL Filter, Update Accelerator, Calamaris…

Developing apps on Qt

Developing Apps on Qt, Part 3

In the previous article, we covered some important Qt non-GUI classes; I hope you experimented with others, since the secret to learning lies in experimenting. In this article, we will work on the…

Installing and using PostgreSQL modules

Installing and Using PostgreSQL Modules

In this article, we will learn how to install and use the PostgreSQL modules chkpass, fuzzystrmatch, isn and hstore. Modules add different capabilities to a database, like admin and monitoring tools, new data…

An engineer's toolkit

Exploring Software: A Software Engineer’s Toolkit

Software engineering recommendations have not changed. The issues and concerns have been known for years. However, with the availability of excellent tools, it is now no longer a pain to implement and follow…

The virtual FS

Device Drivers, Part 16: Kernel Window — Peeping through /proc

This article, which is part of the series on Linux device drivers, demonstrates the creation and usage of files under the /proc virtual filesystem. After many months, Shweta and Pugs got together for…

Robot Operating System

Open Source Robotics Software Platforms

This first article in the series on open source software for robotic introduces the reader to open source robotics software platforms and focuses on the Robot Operating System (ROS). Robotics has always lured…

Licensing freedom?

FOSS is __FUN__: The Fifth Freedom

Stallman’s classic definition of open source speaks of the four freedoms — the freedom to run the program in any way one likes, the freedom to study the source code and modify it,…

Your ownCloud

ownCloud 3 Makes Setting up and Accessing Your Own Cloud Dead Easy

We are all aware that storing data in the cloud has its own advantages, making our data available everywhere we go. But storing our personal data on someone else’s server might lead to…

Taming the Big Data with Hadoop

Taming the Big Data Beast with Hadoop and Alternatives

Turn the clock back to 1970 — the year in which Edgar Codd published the paper “A Relational Model of Data for Large Shared Data Banks”. In it he described a language called…

Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.