Quantcast
Channel: Sameh Attia
Browsing all 1406 articles
Browse latest View live

How to secure Tomcat

http://www.openlogic.com/wazi/bid/345200/how-to-secure-tomcatApache Tomcat has a relatively low number of vulnerabilities compared to other web technologies, but to maintain a stable and secure...

View Article


Image may be NSFW.
Clik here to view.

How to manage passwords from the command line on Linux

http://xmodulo.com/2014/05/manage-passwords-command-line-linux.htmlWith password-based authentication so prevalent online these days, you may need or already use some sort of password management tool...

View Article


4 words to avoid when negotiating the use of open source at your job

http://opensource.com/business/14/5/negotiate-open-source-on-the-jobIf you work in an organization that isn’t focused on development, where computer systems are used to support other core business...

View Article

Unix: Automating your server inventory

http://www.itworld.com/operating-systems/418542/unix-automating-your-server-inventoryUnix systems offer many commands that can be used to pull information from your servers and help you prepare an...

View Article

Image may be NSFW.
Clik here to view.

Open source library system Evergreen rewards the community

http://opensource.com/education/14/4/evergreen-library-systemAs a systems librarian at an academic institution, I am a conduit between those who want to access the resources our library offers and my...

View Article


Image may be NSFW.
Clik here to view.

AutoSSH, for All Your

http://www.linuxjournal.com/content/autossh-all-your-connection-lost I love SSH. I mean, I really, really love SSH. It's by far the most versatile, useful, amazingly powerful tool in my system...

View Article

Image may be NSFW.
Clik here to view.

Two-Factor Authentication System for Apache and SSH

http://www.linuxjournal.com/content/two-factor-authentication-system-apache-and-ssh If you run a publicly accessible Web server for your own use (and let's face it, if you're reading Linux Journal,...

View Article

Image may be NSFW.
Clik here to view.

Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux

http://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpattyThere are just too many guides on Cracking Wifi WPA/WPA2 passwords using different methods. Everyone has their...

View Article


Adding Static Routes On Various *NIX (Linux,AIX,HP-UX)

http://www.nextstep4it.com/categories/how-to/unix-gatewayStatic routes are generally required for  traffic that must not, or should not, go through the default gateway. In this article we will discuss...

View Article


Image may be NSFW.
Clik here to view.

How to interpret CPU load on Linux

http://www.itworld.com/virtualization/419480/how-interpret-cpu-load-linuxUsing CPU resources effectively across virtual machinesMonitoring, anticipating, and reacting to server load is a full time job...

View Article

Image may be NSFW.
Clik here to view.

How to set up a web-based lightweight system monitor on Linux

http://xmodulo.com/2014/05/web-based-lightweight-system-monitor-linux.htmlSometimes we, as a normal user or a system admin, need to know how well our system is running. Many questions related to system...

View Article

Image may be NSFW.
Clik here to view.

Remote Router Hack: DSL ADSL router hack using NMAP on Kali Linux. Windows...

http://www.blackmoreops.com/2014/05/15/remote-router-hack-dsl-adsl-router-hack-using-nmap-on-kali-linuxA simple Remote Router Hack guide by blackMORE Ops Asynchronous digital subscriber line (DSL or...

View Article

Image may be NSFW.
Clik here to view.

Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux

http://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpattyCracking Wifi WPA/WPA2 passwords using pyrit cowpatty– with cuda or calpp in Kali LinuxThere are just too many...

View Article


Image may be NSFW.
Clik here to view.

Notable Penetration Test Linux distributions of 2014

http://www.blackmoreops.com/2014/02/03/notable-penetration-test-linux-distributions-of-2014  A penetration test, or the short form pentest, is an attack on a computer system with the intention of...

View Article

Image may be NSFW.
Clik here to view.

OpenStack 101: The parts that make up the project

http://www.networkworld.com/news/2014/051914-openstack-parts-281682.html?source=nww_rssOpenStack is a platform, but it's made up of pieces. Here are the big ones By Brandon Butler, Network World...

View Article


Bash Getopts – Scripts with Command Line Options

http://tuxtweaks.com/2014/05/bash-getoptsI've always wanted to know how to create command line options for my Bash scripts. After some research I found there are two functions available to handle this;...

View Article

Run the same command on many Linux servers at once

http://linuxaria.com/pills/run-the-same-command-on-many-linux-servers-at-onceEver have to check a list of Linux servers for various things like what version of CentOS they’re running, maybe how long...

View Article


The Growing Role of UEFI Secure Boot in Linux Distributions

http://www.linuxjournal.com/content/growing-role-uefi-secure-boot-linux-distributions With the increasing prevalence of open-source implementations and the expansion of personal computing device usage...

View Article

4 Free and Open Source Alternatives of Matlab

http://electronicsforu.com/electronicsforu/circuitarchives/view_article.asp?sno=1804&title%20=%204+Free+and+Open+Source+Alternatives+of+Matlab&b_type=new&id=12985&group_type=cool_stuffM...

View Article

Image may be NSFW.
Clik here to view.

CLI ifconfig – How to setup IP addess from Command Line in Linux

http://www.blackmoreops.com/2013/10/14/cli-ifconfig-setting-ip-addess-command-line-linuxDid you even had trouble with Network Manager or ifconfig and felt that you need to try to set up static IP...

View Article
Browsing all 1406 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>