Quantcast
Channel: Sameh Attia
Browsing all 1406 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IPv6: how and why it enables Internet evolution

http://dougvitale.wordpress.com/2013/03/28/ipv6-how-and-why-it-enables-internet-evolutionInternet Protocol version 6 (IPv6) is the next generation networking protocol that is slated to replace Internet...

View Article


75 Open Source Apps To Replace Popular Security Software

http://www.datamation.com/security/75-open-source-apps-to-replace-popular-security-software-1.html Hackers seem to be successfully attacking almost everyone these days. Already this year, the news has...

View Article


Image may be NSFW.
Clik here to view.

Free & Open Source Rootkit and Malware Detection Tools

http://linuxaria.com/article/free-open-source-rootkit-and-malware-detection-tools?lang=enA lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used...

View Article

Image may be NSFW.
Clik here to view.

Open Source Project Mimics Yahoo Pipes on Your Own Machine

http://www.wired.com/wiredenterprise/2013/03/huginWeb applications are so very convenient. But there’s always a rub. When you move your life onto the web, you lose control of your data. And — who...

View Article

Configuring One-Time Password Authentication with OTPW

http://www.linuxjournal.com/content/configuring-one-time-password-authentication-otpw Password authentication contains a lot of assumptions about security and trust. Encrypted SSH tunnels and public...

View Article


Write your own Ant tasks

http://www.openlogic.com/wazi/bid/278127/write-your-own-ant-tasksApache Ant is a Java-based build tool, and because it's based on Java, it is entirely cross-platform. It comes with a huge list of...

View Article

Unix commands and tools you just can't live without

http://www.itworld.com/operating-systems/350405/unix-commands-and-tools-you-just-cant-live-withoutAre you someone who never met a Unix command you didn't like? OK, maybe not. But are there commands you...

View Article

Image may be NSFW.
Clik here to view.

Mastering The Linux Shell - Getting Permission

http://marcelgagne.com/content/mastering-linux-shell-getting-permissionUnder Linux, access to files and directories is controlled by a system of permissions. Those permissions define who can see a...

View Article


Image may be NSFW.
Clik here to view.

Linux Booting Process

http://resources.infosecinstitute.com/linux-booting-processIntroduction In this article, we’ll take a closer look at the booting process of the Linux operating system. We’ve already described the...

View Article


How to write CentOS initialization scripts with Upstart

http://www.openlogic.com/wazi/bid/281586/How-to-write-CentOS-initialization-scripts-with-UpstartOn Linux systems, initialization (init) scripts manage the state of system services during system startup...

View Article

Image may be NSFW.
Clik here to view.

Wine for advanced users and developers (Build and run windows apps without...

http://www.linuxuser.co.uk/tutorials/wine-for-advanced-users-and-developersWhile Linux has one of the largest software catalogues on the planet, there are still many software applications which are...

View Article

How To Do Mass Enrolling Of Yubikey With LinOTP

http://www.howtoforge.com/how-to-do-mass-enrolling-of-yubikey-with-linotpThe Yubikey comes shipped with a secret that can be used to authenticate against the Yubico online service. In many cases this...

View Article

Image may be NSFW.
Clik here to view.

Wi-Fi Mini Honeypot

http://www.linuxjournal.com/content/wi-fi-mini-honeypot Do you have an old, unused wireless router collecting dust? Have some fun and make a Wi-Fi honeypot with it! Recently, I've been playing with...

View Article


Image may be NSFW.
Clik here to view.

How to scan Linux for vulnerabilities with lynis

http://linuxaria.com/pills/how-to-scan-linux-for-vulnerabilities-with-lynis?lang=enAs a system administrator, Linux security technician or system auditor, your responsibility can involve any...

View Article

Image may be NSFW.
Clik here to view.

What is SUID and how to set SUID in Linux/Unix?

http://www.linuxnix.com/2011/12/suid-set-suid-linuxunix.htmlThere are some other special permission apart from the normal file permissions read, write and execute which we set with chmod and chown...

View Article


Image may be NSFW.
Clik here to view.

Protect your network with Snort

http://www.linuxuser.co.uk/tutorials/protect-your-network-with-snort       Whether meaning to be mischievous or malicious, hackers can wreak havoc on your network. Fortunately, Snort makes it easy to...

View Article

Image may be NSFW.
Clik here to view.

Parallella: The $99 Linux supercomputer

http://www.zdnet.com/parallella-the-99-linux-supercomputer-7000014036Chip-company Adapteva announced on April 15th at the Linux Collaboration Summit in San Francisco, California, that they've built...

View Article


Image may be NSFW.
Clik here to view.

Improve Power Usage / Battery Life In Linux With TLP

http://www.webupd8.org/2013/04/improve-power-usage-battery-life-in.htmlThere are various tweaks that you can apply to your laptop to save battery power, but many of them depend on the hardware, Linux...

View Article

Image may be NSFW.
Clik here to view.

Mastering the Linux Shell : Killing Processes and Dire Warnings

http://marcelgagne.com/content/mastering-linux-shell-killing-processes-and-dire-warningsToday's installment of Mastering the Linux Shell comes with a warning. Actually, it comes with a few warnings....

View Article

Image may be NSFW.
Clik here to view.

Monitorix (A Lightweight System and Network) Monitoring Tool for Linux

http://www.tecmint.com/monitorix-a-lightweight-system-and-network-monitoring-tool-for-linuxMonitorix is an open source, free and most powerful lightweight tool designed to monitor system and network...

View Article
Browsing all 1406 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>