Home Search

Linux - search results

If you're not happy with the results, please do another search

Face to Face with RMS

1
It was one of the rarest opportunities to spend some time with the man I’ve always looked up to since I migrated to GNU/Linux systems...

Recipes for Networking

4
It’s always fun to try out different hacks under the GNU/Linux freedom platform. The pride of becoming a command-line wizard makes everyone stay close to the CLI. Moreover, the CLI vests you with the ultimate power to control your machine.

Building a Server from Scratch

4
Why buy expensive ‘branded’ servers? Build one yourself using off-the-shelf hardware.

GlassFish, Part 1: Architecture, Community, et al.

1
An application server is a software stack that provides the business logic of a large-scale distributed application. These business logic and business processes are...

Vulnerability Assessment: Have You Done it Yet?

2
Regular vulnerability assessment of your systems/networks is a must. OpenVAS is one such tool that can assist you.

Scripts for Home Network

0
Part 9 of the "Programming in Python for Friends and Relatives" series discusses how to build some nifty scripts to check remote systems over the Internet.

FreedomYug: How To Melt Down

0
Start with professional qualifications. Nobody has said it yet: The global financial crisis is hand-crafted by highly-educated people. Most of them armed with post-graduate and...

Now, Package Management is Intelligent by Design

0
Enter PackageKit, a distribution-neutral package manager.

My Own Phone Dialler, Only on Android

4
So you want to build a custom phone dialler for your cell phone? In the case of a typical mobile OS, to intercept core areas like the contact book or the dialler itself is not only difficult but also needs in-depth knowledge of the phone's OS. Unlike that, Android has an extremely modular architecture based on the Linux kernel. In this article, we'll learn how to harness the power of one such API in Android.

It’s So Easy to See Your Network Activity, hah!

1
Just because you’re using a WEP key on your wireless access point doesn’t mean you’re safe from crackers in the neighbourhood.