Home 2011
Yearly Archives: 2011
Device Drivers, Part 4: Linux Character Drivers
This article, which is part of the series on Linux device drivers, deals with the various concepts of character drivers and their implementation.
Metasploit 101 with Meterpreter Payload
The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS...
Securing Apache, Part 6: Attacks on Session Management
In this part of the series, we are going to concentrate on attacks on session management. Application-level attacks on the session is about obtaining...
The Needle and the Haystack: Exploring Search Models, Part 1
Searching for the proverbial needle in the haystack occurs millions of times a day in the realm of cyberspace. Ever looked under the hood...
Let’s Play with GNU Screen
Many GNU/Linux users spend time working at the command line. The GNU Screen utility can be of great use if you work with multiple...
Demystifying the Cloud with eyeOS
It's another day in your life with technology and you keep hearing people talk about "Cloud this
" and "Cloud that
" or "Just store it...
Puppet Data Centre Automation Solution, Part 4: Classes & Modules
We learned about some of the interesting ways Puppet helps automate things in Part 3. In the final part of this series, we look...
Capturing Packets In Your C Program, With Libpcap
This article provides an introduction to libpcap, and shows, with examples of source code, how you can use it to create your own packet-sniffing...
Advanced Nmap: Scanning Firewalls
After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...
FreedomYUG: Go Forth And Copy Left
How To Successfully Earn a Living with FOSS -- Part 1
Do you want to be an independent professional? More importantly, do you want to...













































































