"virtual machine" tag
Let's set up QEMU first!

The Quick Guide to QEMU Setup

In this series of articles, we will explore the basics of QEMU, OS installation, QEMU networking and embedded system development for the ARM architecture. In this first part, let’s begin with the basics….

A network

Nessus with Metasploit — Track and Hack

Networks play an important role in a sysadmin’s life. But have you ever wondered about the security of your network, or tried to find out how vulnerable it is? Let’s discover how to…

VNCInjection with courtesy shell enabled, by default

Metasploit 101 with Meterpreter Payload

The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 640 exploit definitions…

BackTrack 4

BackTrack 4: A One-Stop Shop for Security Analysis and Learning

Computer security analysts have plenty of tools available nowadays to evaluate the security of corporate networks, servers and applications. These include Linux distributions specialising in security assessment, system recovery and digital forensic investigations….

Lock it up!

Securing Apache, Part 1: The Basics

Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security, this series of articles intends to cover the strengthening…

Because it's fun to code on GNU/Linux

Write Your Next Program on Linux

Quite a few colleges and schools still teach C/C++/Java programming on Windows — and even worse, on DOS (using Turbo C/C++)! GNU/Linux provides a first class operating system, replete with support for dozens…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.