Home 2011 January

Monthly Archives: January 2011

Kernel Oops!

Understanding a Kernel Oops!

13
Understanding a kernel panic and doing the forensics to trace the bug is considered a hacker's job. This is a complex task that requires...
Track the DNA of your code!

Do You Know the Trick to Track Your Code’s DNA?

3
You can now manage the source code for software-related product development in your organisation, using the Black Duck Suite, which among other capabilities, generates...
Kernel C Extras

Device Drivers, Part 3: Kernel C Extras in a Linux Driver

37
This article in the series on Linux device drivers deals with the kernel's message logging, and kernel-specific GCC extensions. Enthused by how Pugs impressed their...
Secured!

Securing Apache, Part 5: HTTP Message Architecture

2
In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article...
3D plot in colour

Plotting is Fun with GNUPlot

1
This article explores the use of GNUPlot for scientific plotting, along with examples. While strings and pages of data seem cryptic, a plot reveals the...
Handling interrupts

Handling Interrupts

0
In my last article, we explored the concept of interrupts and how they catch the CPU's attention. In this article, we will look at...
VirtualBox on a browser

phpVirtualBox — Accessing VirtualBox from a Browser

9
This article introduces phpVirtualBox, an open-source, AJAX and PHP-based implementation of the Oracle VirtualBox user interface
Scan time!

Advanced Nmap: FIN Scan & OS Detection

1
Nmap is a fantastic tool, and I just can't refrain from praising it, every time I use it. The earlier articles in this series...
Wi-Fi penetration testing

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

13
Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage...
Puppet resource types

Puppet Data Centre Automation Solution, Part 3: Resource Types & Example Configs

0
The previous article in this series focused on creating users, groups and files (based on home directories). Let's now look at the various types...