Home Search

Linux - search results

If you're not happy with the results, please do another search

Beware: Its Easy to Launch a Wireless Deauthentication Attack!

8
This article shows how easily someone can pull off an attack on an 802.11 Wi-Fi network. The author sets up a mock attack using...

Ghost: A Powerful Blogging Platform

1
  If you are on the lookout for a blogging platform, give Ghost a try. It’s a simple yet powerful publishing platform that opens up...

Assigning Map Projections in QGIS

0
QGIS is free and open source software for creating, editing, visualising, analysing and publishing geospatial information. It is OS-independent and works on Linux, Windows,...

Top FOSS Tools to Tech-Up the Teaching-Learning Experience

1
The teaching-learning process can be assisted, made more efficient and enhanced with the use of technology. Gen Y and Gen Z tend to learn...

Research Areas and Simulation in Cloud Computing

2
This article looks at the backbone technologies in cloud computing, and suggests some areas of research in this field as well as a few...

Wireshark: Essential for a Network Professional’s Toolbox

0
Wireshark, a free and open source tool, is a packet analyser. It is used for network troubleshooting,  software-analysis, protocol development, and education. In this...

Automating Browsers with Ruby and Watir-webdriver

0
Lightweight and simple to use, Watir is a browser driver that is great for automating modern browsers. It is built on Ruby but it...

Haskell: The Purely Functional Programming Language

0
Haskell, an open source programming language, is the outcome of 20 years of research. It has all the advantages of functional programming and an...

Be Cautious while using Bit Fields for Programming

5
In this article, the author tells embedded C programmers why writing code involving bit fields needs to be done carefully, failing which the results...
Ten Tools for Configuration Management

Ten Tools for Configuration Management

2
Configuration management (CM) comprises the detailed description and updating of information related to an enterprise’s software and hardware. This article lists the top 10...