"routers" tag
Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Marching packets

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service attack, which we discussed in detail. This month, we…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

Secured!

Securing Apache, Part 8: DoS & DDoS Attacks

In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial of Service (DoS)…

Smart TV

FreedomYUG: Is Your TV Watching You? Even If It Runs Linux Inside?

Something’s happened to my TV — it’s turned intelligent. The dumbest TV shows still stream mindlessly on it, 24×7, through the cable-box, but the TV has new smarts. For starters, it’s got USB…

Dabble with Netkit to Sandbox a Network

Networking is very interesting and I’m sure many of us would like to experiment with it, but the unavailability of laboratories with sufficient computers is a stumbling block. What if I tell you that you can turn any computer into a network device at no extra cost?

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.