Home 2011
Yearly Archives: 2011
Best Practices in Network Security Monitoring
This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that...
Using QEMU for Embedded Systems Development, Part 1
Last month, we covered the basic use of QEMU. Now let's dig deeper into its abilities, looking at the embedded domain.
Techies who work in...
Exploring Software: openSUSE Tumbleweed Rolling Distribution Goes Mainstream
Here is a record of my initial explorations and findings about the recently released openSUSE rolling distribution repository, Tumbleweed, as experienced on a netbook.
I...
Joy of Programming: Levels of Exception Safety
The concept of "exception safety" is important for programming in the presence of exceptions. In this article, we'll look at different levels of exception...
FreedomYUG: Do You Really Love Yourself?
...or do you use Windows 7 Starter Edition on a netbook?
Do you genuinely love and respect yourself? Or did you just agree to buy...
CodeSport
In this month's column, we continue our discussion of binary instrumentation tools, and look at a few popular dynamic instrumentation frameworks.
Last month, we had...
GNOME 3 is Here!
GNOME 3, code-named ToPaZ (for Three Point Zero), was released on April 6 this year. The release has raised many questions. Can GNOME 3...
NIT-C Students Use PostgreSQL to Design Their Own Video Repository
The students of NIT-C, who were one of the winners of the EnterpriseDB PostgreSQL contest, share with the LINUX For You team how they...
About Live CDs & How to Cut a Live Disc Using UCK
When I heard the term Live CD, I thought it was a rock band -- but very soon, I learnt what a wonderful thing...
How to Produce an eBook in ePub Format
An ebook will never smell as good as that old leather-bound volume of classics on grandfather's bookshelf; but the ebook format, residing inside an...













































































