Home 2012

Yearly Archives: 2012

Encrypt your data

TrueCrypt — Learn the Art of Encryption

6
When did you last feel that you ought to have secured that important file so nobody else could view it without your permission? Ever...
What a wonderful world

Open Source Sets Microsoft’s Kinect Free

3
This first article in this series gives a brief overview of the Kinect sensor, the different terms used like natural user interface and machine...

Guard Your Network with IPCop, Part 3: Block Outgoing Traffic

9
The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....
Preparing for programming interviews?

CodeSport

2
This month's column is special, in honour of LFY's 9th anniversary. We feature tips on how to prepare for programming interviews. This month, we celebrate...
Substitution...

Joy of Programming: Liskov’s Substitution Principle

8
LSP is a cardinal rule to follow in object-oriented designs. In this column, we'll introduce LSP to those new to OOP (Object Oriented Programming),...
Is it the best IDE?

FOSS is __FUN__: The Best IDE

2
In any forum that talks about programming, a frequent topic is, "What is the best IDE for the language/framework under discussion?" This often leads to...
Healthcare can't wait!

Exploring Software: Easier Healthcare Using IT

1
This article is not so much about trying out any software as about the need we all feel for reliable care-givers for the elderly...
How to become a hacker!

Hackers and the Open Source Revolution

8
This piece corrects the confusion created by mainstream media between "hacker" and "cracker". It also considers the history, nature, attributes, ethics and attire of...
security assessment tools

Top 10 Security Assessment Tools

14
Modern data centres deploy firewalls and managed networking components, but still feel insecure because of crackers. Hence, there is a crucial need for tools...
Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

4
We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...