Home 2011

Yearly Archives: 2011

The toolbox I swear by...

GNU Binutils: A Collection of Binary Tools

2
With years of experience as a systems programming engineer, I've realised that to be a great artist of programming, you must understand the basics...
Got stuck again?

Lisp: Tears of Joy, Part 5

1
Lisp has been hailed as the world's most powerful programming language. But only the top percentile of programmers use it, because of its cryptic...
Hello there, Foxies

A Letter to Foxy Developers

1
A look at what makes Mozilla Firefox the most developer friendly browser around, and how you can get the most out of the community-developed...
Android App Development

Android App Development: Hardware and Sensors

3
I’m back with another article on Android application development. This time, we will discuss how to access some of the phone’s hardware components like...
Free your mind

FOSS is __FUN__: Free Your Mind

0
Golf, par, handicaps -- and sub-classing, abstraction and lines of code. Sounds interesting? Last month, I have had the privilege of listening to two presentations...
It's time we file

Storage Management using Openfiler, Part 3

0
The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1...
Syn Flooding

SYN Flooding using SCAPY and Prevention using iptables

15
DoS (Denial of Service) attacks against Web services make them unavailable for legitimate users, affecting the website owner's potential business. These involve intentional consumption...
Time to rsync

Backups and More with rsync

1
Learn how to use this powerful utility that almost all experts use in their day-to-day work, to perform tasks like back-ups, and much more. The...
It's concurrent servers time

The Socket API, Part 3: Concurrent Servers

4
In this part of the series, we will learn how to deal with multiple clients connected to the server. Welcome to another dose of socket...
uhh, not the rootkits again

Chkrootkit — Eliminate the Enemy Within

1
Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a...