"SSL" tag
Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect our infrastructure from them? This article is about how…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

Tightened Security

Securing Apache, Part 11: Logs, et al.

In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways. Configuring a system to be secure is indeed a key task,…

Time to keep things updated

CodeSport (July 2011)

In this month’s column, we will look at how software upgrades could lead to failure in some cases, and how online software updates can help to reduce application downtime. In the last couple…

Bible

The Comperhensive LAMP Guide, Part-1: Compiling and Optimising Apache

These days, almost everyone needs a website. Online business is picking up, and an Internet presence is a must for firms wanting to expand their business. If you’re the freelance Web designer or…

Securing Database Servers

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider implementing security at a network layer to protect the…

Load balancing?

Layer 7 Load Balancers

Linux has proven itself as a rock-solid operating system platform for industry-leading software appliances and applications, one of which is for load-balancing. As global Internet traffic increases, it demands an increased throughput from…

Middleware basics

Understanding Middleware with Apache ActiveMQ

Even though “middleware” might seem like a close cousin of Tolkien’s Middle Earth, it’s a fairly modern term in computer software and services, and has nothing to do with hobbits, wizards or adventures…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.