Home Tags Encryption

Tag: encryption

Looking for a Free Backup Solution? Try Areca

5
Let's take a look at Areca Backup, which is simple, easy to use, versatile, and makes interacting with your backups easy. Areca Backup is an...

A Peek Into Storage Solutions

2
Open source storage is similar to all other commercial storage products and can fulfill business needs like building Storage Area Network or Network-Attached Storage,...

‘The security threat on the cloud is now passe’

1
With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a...

Open Source Access to MS Exchange Server Using DavMail

1
  This article introduces DavMail and demonstrates its importance in corporate scenarios for accessing mail from MS Exchange Server. Many enterprises use Microsoft Exchange for corporate...

TrueCrypt — Learn the Art of Encryption

6
When did you last feel that you ought to have secured that important file so nobody else could view it without your permission? Ever...

Cyber Attacks Explained: Network Sniffing

5
In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider...

Aadhaar: A Testimony to Success of FOSS in India!

5
It is heartening to see how FOSS is powering one of India's most prestigious and mammoth e-governance initiatives -- the Aadhaar project from the...

Securing Apache, Part 11: Logs, et al.

4
In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways. Configuring a system...

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

13
Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage...

Cryptography and Steganography with Python

5
Steganography and cryptography have been widely used to hide sensitive information. This article offers a brief introduction to how both these methods can be...