Tag: LFY March 2011
The Needle and the Haystack: Exploring Search Models, Part 2
In the previous article, we demystified some search-related jargon, and learned how the humble Grep can be used to simulate a Boolean-model search engine....
Securing Apache, Part 7: Fool-proofing the Server OS
Moving deeper into Web application and Apache security, let's now focus on OS commanding attacks, and those that lead to the disclosure of crucial...
Digital Forensic Analysis Using BackTrack, Part 1
Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a...
DeleGate — A Multi-platform, Multipurpose Proxy Server
A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In...
lighttpd & SQLite: A Lightweight Web Server and Database Platform
This article demonstrates the setting up of a lightweight Web server and database platform, using the lighttpd Web server and the SQLite database management...
Advanced Nmap: Scanning Firewalls Continued
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...
Exploring Software: Getting a Hang of Zope’s Grok
According to Wikipedia, "to grok" is to share the same reality or line of thinking with another physical or conceptual entity. For example, to...
Joy of Programming: Bug Hunt
Every programmer knows that debugging is akin to a detective's work. In this column, we'll cover this "bug hunt" process with an example of...
FreedomYUG: Get Out of Your Own Way
How to Successfully Earn a Living with FOSS -- Part 2
Let's start with a simple example. You convince a friend, colleague, or a client...
CodeSport
Welcome to CodeSport! In this month's column, we turn our attention to software coding errors, which lead to buggy code. We will discuss different...