Quantcast
Channel: Sameh Attia
Browsing all 1417 articles
Browse latest View live

An Introduction to Returned-Oriented Programming (Linux)

http://resources.infosecinstitute.com/an-introduction-to-returned-oriented-programming-linuxINTRODUCTION: In 1988, the first buffer overflow was exploited to compromise many systems. After 20 years,...

View Article


Image may be NSFW.
Clik here to view.

How Netflix Works

http://www.zdnet.com/the-biggest-cloud-app-of-all-netflix-7000014298Netflix, the popular video-streaming service that takes up a third of all internet traffic during peak traffic hours isn't just the...

View Article


Unix: Timing your cron jobs

http://www.itworld.com/operating-systems/354358/unix-timing-your-cron-jobsMost of my Unix admin cronies cut their teeth on tools like cron. There is nearly nothing as fundamentally essential to...

View Article

4 Hot Open Source Big Data Projects

http://www.enterpriseappstoday.com/data-management/4-hot-open-source-big-data-projects.htmlThere's more -- much more -- to the Big Data software ecosystem than Hadoop. Here are four open source...

View Article

Image may be NSFW.
Clik here to view.

Install XCache to Accelerate and Optimize PHP Performance

http://www.tecmint.com/install-xcache-to-accelerate-and-optimize-php-performanceIn most cases PHP performance can slow down the performance of websites. To optimize and accelerate website performance...

View Article


Image may be NSFW.
Clik here to view.

One Of The Most Important Tools In Linux – Understanding Chmod

http://www.makeuseof.com/tag/one-of-the-most-important-tools-in-linux-understanding-chmodThere are plenty of features that make Linux special, but one of them that makes it so secure is its permissions...

View Article

Image may be NSFW.
Clik here to view.

Setup Your Own Certificate Authority (CA) on Linux and Use it in a Windows...

http://virtuallyhyper.com/2013/04/setup-your-own-certificate-authority-ca-on-linux-and-use-it-in-a-windows-environmentIn this previous post, I deployed a test IIS Server and used a self signed SSL...

View Article

Image may be NSFW.
Clik here to view.

How to Setup Two-Factor Authentication (Google Authenticator) for SSH Logins

http://www.tecmint.com/ssh-two-factor-authenticationBy default, SSH already uses a secure data communication between remote machines, but if you want to add some extra security layer to your SSH...

View Article


Image may be NSFW.
Clik here to view.

Audit the security of your Unix/Linux systems using lynis

http://www.unixmen.com/audit-the-security-of-your-unixlinux-systems-using-lynisLynis is an auditing tool for unix/linux like systems which is used to scan the entire unix/linux systems for security...

View Article


Image may be NSFW.
Clik here to view.

ConVirt: the New Tool in Your Virtual Toolbox

http://www.linuxjournal.com/content/convirt-new-tool-your-virtual-toolbox Virtualization is now a staple of the modern enterprise. As more and more shops switch to the virtual paradigm, managing those...

View Article

Creating a Redhat package repository

http://how-to.linuxcareer.com/creating-a-redhat-package-repository1. IntroductionIf your Redhat server is not connected to the official RHN repositories, you will need to configure your own private...

View Article

Image may be NSFW.
Clik here to view.

What is UMASK and how to set UMASK in Linux/Unix?

http://www.linuxnix.com/2011/12/umask-define-linuxunix.htmlUMASK(User Mask or User file creation MASK) is the default permission or base permissions given when a new file(even folder too, as Linux...

View Article

Image may be NSFW.
Clik here to view.

3D Robotics for open source drones- your plastic flying robot buddy

http://nextbigfuture.com/2013/04/3d-robotics-for-open-source-drones-your.html3D Robotics is the leading open source unmanned aerial vehicle (UAV) technology company. It was founded in 2009 by Chris...

View Article


Image may be NSFW.
Clik here to view.

Why Use Xen?

http://www.linux.com/news/enterprise/systems-management/717553-why-use-xenAt the Linux Foundation Collaboration Summit in April, the Xen Project announced that it was now a Collaborative Project of the...

View Article

Create and Restore manual Logical Volume Snapshots

http://how-to.linuxcareer.com/create-and-restore-manual-logical-volume-snapshots1. IntroductionBy creating a Logical Volume snapshots you are able to freeze a current state of any of your logical...

View Article


Image may be NSFW.
Clik here to view.

Install Innotop to Monitor MySQL Server Performance

http://www.tecmint.com/install-innotop-to-monitor-mysql-server-performanceInnotop is an excellent command line program, similar to ‘top command‘ to monitor local and remote MySQL servers running under...

View Article

Unix tip: Using Bash's regular expressions

http://www.itworld.com/operating-systems/355273/unix-bashs-regular-expressionsBash has quietly made scripting on Unix systems a lot easier with its own regular expressions. If you're still leaning on...

View Article


Open Source Apps: the Monster List

It's become something of an annual tradition at Datamation to end the year with a gigantic compilation of all the open source software we've surveyed over the past twelve months or so. (See 2010's Open...

View Article

How to write CentOS initialization scripts with Upstart

http://www.openlogic.com/wazi/bid/281586/How-to-write-CentOS-initialization-scripts-with-UpstartOn Linux systems, initialization (init) scripts manage the state of system services during system startup...

View Article

Image may be NSFW.
Clik here to view.

Wine for advanced users and developers (Build and run windows apps without...

http://www.linuxuser.co.uk/tutorials/wine-for-advanced-users-and-developersWhile Linux has one of the largest software catalogues on the planet, there are still many software applications which are...

View Article
Browsing all 1417 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>