Monthly Archives: April 2015
Decrypt https Traffic with Wireshark
In this article, the author demystifies the business of encrypting and decrypting network traffic, and translates arcane terms such as https, ssh, sftp, etc.
Wireshark,...
Exploring Big Data on a Desktop, with Hadoop, Elasticsearch and Pig
In continuation of earlier articles, the author goes further into the subject to discuss Elasticsearch and Pig, and explain how they can be used...
Ten Lesser Known Commands for Linux Users
The ten Linux commands listed in this article are not well known but can be pretty useful for systems administrators.
Linux is so vast that...
Deploying Infrastructure-as-a-Service Using OpenStack
Cloud computing is the buzzword today. It has many different models, one of which is IaaS. In this article, the authors describes the delivery...
Codesport
In this months column, we feature a set of interview questions on algorithms, data structures, operating systems and computer architecture.
For the past few months,...
Cuckoo: A Malware Analyser Companies Can Depend Upon
Cuckoo is a leading open source malware analyser. The Cuckoo sandbox facilitates effective analysis of various types of malware by monitoring their behaviour in...
Dangling Pointers Avoid them Strictly!
This article takes off from an earlier one on constant pointers. Here, the focus is on dangling pointershow they occur and how to prevent...
Qt5: GUIs with QtQuick and QML
In the previous article on Qt5 (Part 2), we built a small server program that served a random fortune cookie to anyone who connected...
Run Automated System Tasks With Anacron
Periodic command scheduling is the main feature of Anacron, which, in contrast with Cron, does not assume that the system is running all the...
Analyse Packet Capture to Protect Your Network
For a network administrator or someone in a production environment who gets paranoid about whether anybody is snooping on the network, tools such as...