The Complete Magazine on Open Source

Home Posts Tagged "LFY March 2011" (Page 2)

LFY March 2011

,

In the previous article, we demystified some search-related jargon, and learned how the humble Grep can be used to simulate a Boolean-model search engine. …

,

Moving deeper into Web application and Apache security, let’s now focus on OS commanding attacks, and those that lead to the disclosure of crucial …

,

Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a …

,

A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In …

,

This article demonstrates the setting up of a lightweight Web server and database platform, using the lighttpd Web server and the SQLite database management …

,

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead …

,

According to Wikipedia, “to grok” is to share the same reality or line of thinking with another physical or conceptual entity. For example, to …

,

Every programmer knows that debugging is akin to a detective’s work. In this column, we’ll cover this “bug hunt” process with an example of …

,

How to Successfully Earn a Living with FOSS — Part 2 Let’s start with a simple example. You convince a friend, colleague, or a …

,

Welcome to CodeSport!  In this month’s column, we turn our attention to software coding errors, which lead to buggy code. We will discuss different …