"network" tag

A Peek Into Storage Solutions

Open source storage is similar to all other commercial storage products and can fulfill business needs like building Storage Area Network or Network-Attached Storage, file synchronisation and array clustering. We can develop and…

Jumpstart Linux Kernel Module Programming

Here’s an introduction to the Linux kernel module, along with an explanation on how to write a simple pluggable module to the Linux kernel and load the module into the existing kernel. The…

Exploring the Different Linux Career Opportunities

If you are planning to pursue a course in Linux but are doubtful whether it will make you earn money, then you need not worry as the demand for Linus certified professionals are…

Restore Partitions Over the Network Using Clonezilla

Clonezilla is back-up and restore software that is a powerful alternative to Symantec’s famous, yet expensive, commercial software Norton Ghost. Do you often format your partition and reinstall Windows along with other software…

Code Sport

This month’s column continues the discussion on data storage systems, with a focus on how file systems remain consistent even in the face of errors occurring in the storage stack. Last month we…

Easy and Secure File Transferring with WinSCP

Easy and Secure File Transferring with WinSCP Working in a multi-OS environment often requires transferring files between two machines running entirely different operating systems. Even home users who like a range of OSs…

The Good Botnets

iLinuxBot: Designing Botnets to Manage Linux Clients

This article is to encourage newbies to use a little creativity to solve real-world problems. It shows you how to manage a Linux lab, or a lot of Linux PCs, from one machine….

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

The place for Network Security Monitoring

Best Practices in Network Security Monitoring

This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that help achieve this. It is imperative for an IT…

Linux Network Stack Administration: A Developer’s Approach

This article explores the various methods of managing the networking stack using application-level C programs, kernel-level C programs, the proc filesystem, etc.

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.