"unix" tag
Load balancing?

Layer 7 Load Balancers

Linux has proven itself as a rock-solid operating system platform for industry-leading software appliances and applications, one of which is for load-balancing. As global Internet traffic increases, it demands an increased throughput from…

Saving Private GRUB

Saving Private GRUB: Remotely Restoring MBR on an Enterprise Server

Corporate hardware systems differ from their conventional desktop counterparts primarily because they have a number of interesting features. For example, they provide an ability to connect a virtual CD-ROM drive, and use a…

Locked!

Securing Apache, Part 7: Fool-proofing the Server OS

Moving deeper into Web application and Apache security, let’s now focus on OS commanding attacks, and those that lead to the disclosure of crucial information and server directory paths. The attacks described below…

DeliGate, a Proxy

DeleGate — A Multi-platform, Multipurpose Proxy Server

A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In this article, we will briefly discuss one of them,…

Secured!

Securing Apache, Part 6: Attacks on Session Management

In this part of the series, we are going to concentrate on attacks on session management. Application-level attacks on the session is about obtaining or manipulating the session ID without any prior information…

Specify complex access controls with ease

Gitolite: Administer a Central Git Repository without Going Insane

Over the past few years, centralised version control systems like SVN have steadily given way to distributed systems like Git or Mercurial — the former undoubtedly the more powerful and popular of the…

Infected!

The Importance of Intrusion Prevention Systems

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to target those vulnerabilities. While cyber-security cannot be 100 per…

Interrupts are sometimes essential

Interrupts: Breaks that Make Your PC Run

Have you ever noticed how many times you press a key on the keyboard, or how often you click your mouse? Ever wondered how the PC is able to keep track of all…

Automating data centre management

Puppet Data Centre Automation Solution, Part 2: User & Group Management

In our last session, we had learnt how to set up a basic Puppet server and client architecture. Today, we will look at how to create users and groups, and a little bit…

Data centre management

Puppet Data Centre Automation Solution, Part 1: Setting Up Master & Client

Managing data centres comprising hundreds of systems is tough. Fortunately, configuration-management systems help bring things under control, by automating common configuration tasks, making systems manageable from a central location. This article focuses on…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.