The Complete Magazine on Open Source

Home Articles Posted by Prashant Phatak (Page 2)

Posts by : Prashant Phatak

Author / 19 Posts
The author has experience of over 18 years in the field of IT hardware, networking, Web technologies and IT security. For the past 11 years, he has worked at Merrill Lynch, New York. He handled technology verticals such as solution architecture, operations and support, cyber security etc., and led a global team supporting mission-critical business applications running on a finance trading platform. Recently, Prashant started his own firm, Valency Networks, in India.
,

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider …

,

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service …

,

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With …

,

Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a …

,

While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a …

,

This article details the best practices organisations can follow to strengthen their network monitoring procedures, and also talks about a few FOSS products that …

,

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider …

,

Linux has proven itself as a rock-solid operating system platform for industry-leading software appliances and applications, one of which is for load-balancing. As global …

,

In today’s fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to …