Home 2012
Yearly Archives: 2012
TrueCrypt — Learn the Art of Encryption
When did you last feel that you ought to have secured that important file so nobody else could view it without your permission? Ever...
Open Source Sets Microsoft’s Kinect Free
This first article in this series gives a brief overview of the Kinect sensor, the different terms used like natural user interface and machine...
Guard Your Network with IPCop, Part 3: Block Outgoing Traffic
The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....
CodeSport
This month's column is special, in honour of LFY's 9th anniversary. We feature tips on how to prepare for programming interviews.
This month, we celebrate...
Joy of Programming: Liskov’s Substitution Principle
LSP is a cardinal rule to follow in object-oriented designs. In this column, we'll introduce LSP to those new to OOP (Object Oriented Programming),...
FOSS is __FUN__: The Best IDE
In any forum that talks about programming, a frequent topic is, "What is the best IDE for the language/framework under discussion?" This often leads to...
Exploring Software: Easier Healthcare Using IT
This article is not so much about trying out any software as about the need we all feel for reliable care-givers for the elderly...
Hackers and the Open Source Revolution
This piece corrects the confusion created by mainstream media between "hacker" and "cracker". It also considers the history, nature, attributes, ethics and attire of...
Top 10 Security Assessment Tools
Modern data centres deploy firewalls and managed networking components, but still feel insecure because of crackers. Hence, there is a crucial need for tools...
Cyber Attacks Explained: DNS Invasions
We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...