Home Tags LFY February 2011

Tag: LFY February 2011

Securing Apache, Part 6: Attacks on Session Management

4
In this part of the series, we are going to concentrate on attacks on session management. Application-level attacks on the session is about obtaining...

The Needle and the Haystack: Exploring Search Models, Part 1

0
Searching for the proverbial needle in the haystack occurs millions of times a day in the realm of cyberspace. Ever looked under the hood...

Let’s Play with GNU Screen

13
Many GNU/Linux users spend time working at the command line. The GNU Screen utility can be of great use if you work with multiple...

Demystifying the Cloud with eyeOS

3
It's another day in your life with technology and you keep hearing people talk about "Cloud this…" and "Cloud that…" or  "Just store it...

Puppet Data Centre Automation Solution, Part 4: Classes & Modules

0
We learned about some of the interesting ways Puppet helps automate things in Part 3. In the final part of this series, we look...

Capturing Packets in Your C Program, with libpcap

31
This article provides an introduction to libpcap, and shows, with examples of source code, how you can use it to create your own packet-sniffing...

Advanced Nmap: Scanning Firewalls

1
After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...

FreedomYUG: Go Forth And Copy Left

2
How To Successfully Earn a Living with FOSS -- Part 1 Do you want to be an independent professional? More importantly, do you want to...

Joy of Programming: SNAFU — Situation Normal, All Fouled Up!

0
The stories of software development projects in crisis are amazingly familiar to all experienced programmers and managers. In this column, we'll look at some...

Exploring Software — Alternatives to Rails, Django

0
Zope 3 never picked up because most of the popular projects/products based on the application server never migrated from Zope 2. With "Grok --...