Tag: LFY September 2011
Securing Apache, Part 11: Logs, et al.
In this final part of the series, we will discover how to strengthen security in Apache by logging and other miscellaneous ways.
Configuring a system...
VMWare Player, VirtualBox, KVM: Finding Virtualisation Software that Fits
This article is intended to guide users in choosing the best virtualisation solution for themselves.
According to Wikipedia: "Virtualisation, in computing, is the creation of...
Creating Your Own Server: The Socket API, Part 2
Earlier, we created a simple server and client program using the socket API. This time, we'll first start with a program, and then explain...
Storage Management using Openfiler, Part 2
The first part of this series gave readers step-by-step instructions to build Openfiler from scratch. This second part covers two additional important features of...
Rootkits: The Enemy Within
While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a...
Recover Deleted Files in Linux
Have you accidentally deleted an important file because you have the habit of using Shift+Del instead of only Del? Well, don't panic. I had...
Demystifying Backups
Backups are a crucial part of our digital lives, yet they don't always get the love they deserve. Keeping backups is sometimes confusing, thanks...
Amanda: A One-Stop Solution for All Your Backup Problems
Looking for an enterprise backup solution for your servers? Is your network too complex to be handled by simple backup utilities? Does the thought...
Exploring Software: KDE’s Semantic Desktop
In this article, you will get an idea of the current state of the ambitious Nepomuk project. As part of KDE's semantic desktop, it...
Joy of Programming: The Technology Behind Static Analysis Tools
There are a wide range of static analysers available today -- both commercial as well as open source. Have you ever wondered how static...