IPv6: how and why it enables Internet evolution
http://dougvitale.wordpress.com/2013/03/28/ipv6-how-and-why-it-enables-internet-evolutionInternet Protocol version 6 (IPv6) is the next generation networking protocol that is slated to replace Internet...
View Article75 Open Source Apps To Replace Popular Security Software
http://www.datamation.com/security/75-open-source-apps-to-replace-popular-security-software-1.html Hackers seem to be successfully attacking almost everyone these days. Already this year, the news has...
View ArticleFree & Open Source Rootkit and Malware Detection Tools
http://linuxaria.com/article/free-open-source-rootkit-and-malware-detection-tools?lang=enA lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used...
View ArticleOpen Source Project Mimics Yahoo Pipes on Your Own Machine
http://www.wired.com/wiredenterprise/2013/03/huginWeb applications are so very convenient. But there’s always a rub. When you move your life onto the web, you lose control of your data. And — who...
View ArticleConfiguring One-Time Password Authentication with OTPW
http://www.linuxjournal.com/content/configuring-one-time-password-authentication-otpw Password authentication contains a lot of assumptions about security and trust. Encrypted SSH tunnels and public...
View ArticleWrite your own Ant tasks
http://www.openlogic.com/wazi/bid/278127/write-your-own-ant-tasksApache Ant is a Java-based build tool, and because it's based on Java, it is entirely cross-platform. It comes with a huge list of...
View ArticleUnix commands and tools you just can't live without
http://www.itworld.com/operating-systems/350405/unix-commands-and-tools-you-just-cant-live-withoutAre you someone who never met a Unix command you didn't like? OK, maybe not. But are there commands you...
View ArticleMastering The Linux Shell - Getting Permission
http://marcelgagne.com/content/mastering-linux-shell-getting-permissionUnder Linux, access to files and directories is controlled by a system of permissions. Those permissions define who can see a...
View ArticleLinux Booting Process
http://resources.infosecinstitute.com/linux-booting-processIntroduction In this article, we’ll take a closer look at the booting process of the Linux operating system. We’ve already described the...
View ArticleHow to write CentOS initialization scripts with Upstart
http://www.openlogic.com/wazi/bid/281586/How-to-write-CentOS-initialization-scripts-with-UpstartOn Linux systems, initialization (init) scripts manage the state of system services during system startup...
View ArticleWine for advanced users and developers (Build and run windows apps without...
http://www.linuxuser.co.uk/tutorials/wine-for-advanced-users-and-developersWhile Linux has one of the largest software catalogues on the planet, there are still many software applications which are...
View ArticleHow To Do Mass Enrolling Of Yubikey With LinOTP
http://www.howtoforge.com/how-to-do-mass-enrolling-of-yubikey-with-linotpThe Yubikey comes shipped with a secret that can be used to authenticate against the Yubico online service. In many cases this...
View ArticleWi-Fi Mini Honeypot
http://www.linuxjournal.com/content/wi-fi-mini-honeypot Do you have an old, unused wireless router collecting dust? Have some fun and make a Wi-Fi honeypot with it! Recently, I've been playing with...
View ArticleHow to scan Linux for vulnerabilities with lynis
http://linuxaria.com/pills/how-to-scan-linux-for-vulnerabilities-with-lynis?lang=enAs a system administrator, Linux security technician or system auditor, your responsibility can involve any...
View ArticleWhat is SUID and how to set SUID in Linux/Unix?
http://www.linuxnix.com/2011/12/suid-set-suid-linuxunix.htmlThere are some other special permission apart from the normal file permissions read, write and execute which we set with chmod and chown...
View ArticleProtect your network with Snort
http://www.linuxuser.co.uk/tutorials/protect-your-network-with-snort Whether meaning to be mischievous or malicious, hackers can wreak havoc on your network. Fortunately, Snort makes it easy to...
View ArticleParallella: The $99 Linux supercomputer
http://www.zdnet.com/parallella-the-99-linux-supercomputer-7000014036Chip-company Adapteva announced on April 15th at the Linux Collaboration Summit in San Francisco, California, that they've built...
View ArticleImprove Power Usage / Battery Life In Linux With TLP
http://www.webupd8.org/2013/04/improve-power-usage-battery-life-in.htmlThere are various tweaks that you can apply to your laptop to save battery power, but many of them depend on the hardware, Linux...
View ArticleMastering the Linux Shell : Killing Processes and Dire Warnings
http://marcelgagne.com/content/mastering-linux-shell-killing-processes-and-dire-warningsToday's installment of Mastering the Linux Shell comes with a warning. Actually, it comes with a few warnings....
View ArticleMonitorix (A Lightweight System and Network) Monitoring Tool for Linux
http://www.tecmint.com/monitorix-a-lightweight-system-and-network-monitoring-tool-for-linuxMonitorix is an open source, free and most powerful lightweight tool designed to monitor system and network...
View Article