Home Search
Linux - search results
If you're not happy with the results, please do another search
This Security Checklist Can Help Sysadmins Combat Attacks!
The list has been published by the Linux Foundation.
Linux Foundation has released a new list of security recommendations that is particularly helpful for the...
Things to do After Installing Fedora 22
Having installed Fedora 22, a newbie is often at a loss for what to do next. This article guides the reader through the process...
Penetration Testing Tools for Android
Since Android devices have become all-pervasive, they need to be monitored and secured for obvious reasons. Numerous Android apps are available in the market...
An Introduction to GNU Emacs
GNU Emacs, created by Richard Stallman, is an extensible, customisable text editor. While Emacs has many variants, GNU Emacs is the most widely used....
Protect Your Eyes with Redshift
Redshift will help you to reduce the strain on your eyes when working with computers and laptops, particularly in the dark or in low-light...
Testing Video Transmission in Ns-2 Using the EvalVid Framework
Ns-2 is a discrete event simulator targeted at networking research. It provides support for simulation of TCP, routing and multicast protocols over wired and...
Generating Computer Graphics with OpenGL
OpenGL is the industrys most widely used environment for the development of portable, interactive 2D and 3D graphics applications. The OpenGL API is open...
A Primer on Evil Twin Wireless Attacks
In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched...
Relay Mails Using Gmail on RHEL6.1
This article explains the use of Postfix as a mail transfer agent to relay mails using Gmail.
In this article, lets explore how to configure...
Observium The Tireless Network Monitor
Network monitoring involves constant monitoring of how the network functions by collecting useful data from its various parts, which helps to alert the network...