"Security" tag
bitcoin-visual

An Introduction to Bitcoin: The Open Source Cryptographic Currency

Bitcoin is the new ‘virtual currency’ that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it is relatively new, much is not known about it….

Sheshagiri-Anegondi

‘The security threat on the cloud is now passe’

With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a new multi-tenant architecture, by which the company attempts to…

The Connect Between Cloud Computing and Android Apps

Android, a Linux-based operating system whose code was released by Google under the Apache licence, is used primarily in touchscreen devices. It has a large developer community, which writes apps that expand the…

Manage Your Routine Tasks With Jenkins

This article shows how to set up Jenkins for email-notification, and build set-up on Linux- fedora core. In a software project life cycle, we are continuously integrating software on the version control, and…

Secure Your Network with Firewall Builder

A firewall isolates a trusted, secure internal network from another network like the Internet, which is not regarded as either trusted or secure. Firewall Builder is an open source product that makes it…

Set Up a Certificate Authority in RHEL5

Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for authentication purposes and you must have encountered a…

Protecting System Intents in Android

The last article on ‘Intents in Android’ covered the basics of one of Android’s important inter-application communication mechanisms intents. This article goes deeper into Android’s System Intents, and their security aspects, i.e., how…

Tightened Security

Securing Apache, Part 11: Logs, et al.

In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways. Configuring a system to be secure is indeed a key task,…

Rootkits: The Enemy Within

Rootkits: The Enemy Within

While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a Linux distribution makes it vulnerable to programmatic and manual…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.