Home Tags LFY January 2011

Tag: LFY January 2011

Do You Know the Trick to Track Your Code’s DNA?

3
You can now manage the source code for software-related product development in your organisation, using the Black Duck Suite, which among other capabilities, generates...

Device Drivers, Part 3: Kernel C Extras in a Linux Driver

37
This article in the series on Linux device drivers deals with the kernel's message logging, and kernel-specific GCC extensions. Enthused by how Pugs impressed their...

Securing Apache, Part 5: HTTP Message Architecture

2
In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article...

Plotting is Fun with GNUPlot

1
This article explores the use of GNUPlot for scientific plotting, along with examples. While strings and pages of data seem cryptic, a plot reveals the...

Handling Interrupts

0
In my last article, we explored the concept of interrupts and how they catch the CPU's attention. In this article, we will look at...

phpVirtualBox — Accessing VirtualBox from a Browser

9
This article introduces phpVirtualBox, an open-source, AJAX and PHP-based implementation of the Oracle VirtualBox user interface

Advanced Nmap: FIN Scan & OS Detection

1
Nmap is a fantastic tool, and I just can't refrain from praising it, every time I use it. The earlier articles in this series...

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

13
Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage...

Puppet Data Centre Automation Solution, Part 3: Resource Types & Example...

0
The previous article in this series focused on creating users, groups and files (based on home directories). Let's now look at the various types...

The Importance of Intrusion Prevention Systems

6
In today's fast-changing IT world, even the best available security is insufficient for the latest vulnerabilities in various products, and against malware/attacks created to...