"malware" tag

Restore Partitions Over the Network Using Clonezilla

Clonezilla is back-up and restore software that is a powerful alternative to Symantec’s famous, yet expensive, commercial software Norton Ghost. Do you often format your partition and reinstall Windows along with other software…

uhh, not the rootkits again

Chkrootkit — Eliminate the Enemy Within

Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a few detection options. This article continues on the same…

Secured!

Securing Apache, Part 8: DoS & DDoS Attacks

In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial of Service (DoS)…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

The network!

NTop as a Network Diagnostics Tool

The NTop tool is a network traffic monitoring tool that shows network usage, similar to what the popular top command does. This article explains its utility while troubleshooting network problems. Organisations face various…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.