An Introduction to Returned-Oriented Programming (Linux)
http://resources.infosecinstitute.com/an-introduction-to-returned-oriented-programming-linuxINTRODUCTION: In 1988, the first buffer overflow was exploited to compromise many systems. After 20 years,...
View ArticleHow Netflix Works
http://www.zdnet.com/the-biggest-cloud-app-of-all-netflix-7000014298Netflix, the popular video-streaming service that takes up a third of all internet traffic during peak traffic hours isn't just the...
View ArticleUnix: Timing your cron jobs
http://www.itworld.com/operating-systems/354358/unix-timing-your-cron-jobsMost of my Unix admin cronies cut their teeth on tools like cron. There is nearly nothing as fundamentally essential to...
View Article4 Hot Open Source Big Data Projects
http://www.enterpriseappstoday.com/data-management/4-hot-open-source-big-data-projects.htmlThere's more -- much more -- to the Big Data software ecosystem than Hadoop. Here are four open source...
View ArticleInstall XCache to Accelerate and Optimize PHP Performance
http://www.tecmint.com/install-xcache-to-accelerate-and-optimize-php-performanceIn most cases PHP performance can slow down the performance of websites. To optimize and accelerate website performance...
View ArticleOne Of The Most Important Tools In Linux – Understanding Chmod
http://www.makeuseof.com/tag/one-of-the-most-important-tools-in-linux-understanding-chmodThere are plenty of features that make Linux special, but one of them that makes it so secure is its permissions...
View ArticleSetup Your Own Certificate Authority (CA) on Linux and Use it in a Windows...
http://virtuallyhyper.com/2013/04/setup-your-own-certificate-authority-ca-on-linux-and-use-it-in-a-windows-environmentIn this previous post, I deployed a test IIS Server and used a self signed SSL...
View ArticleHow to Setup Two-Factor Authentication (Google Authenticator) for SSH Logins
http://www.tecmint.com/ssh-two-factor-authenticationBy default, SSH already uses a secure data communication between remote machines, but if you want to add some extra security layer to your SSH...
View ArticleAudit the security of your Unix/Linux systems using lynis
http://www.unixmen.com/audit-the-security-of-your-unixlinux-systems-using-lynisLynis is an auditing tool for unix/linux like systems which is used to scan the entire unix/linux systems for security...
View ArticleConVirt: the New Tool in Your Virtual Toolbox
http://www.linuxjournal.com/content/convirt-new-tool-your-virtual-toolbox Virtualization is now a staple of the modern enterprise. As more and more shops switch to the virtual paradigm, managing those...
View ArticleCreating a Redhat package repository
http://how-to.linuxcareer.com/creating-a-redhat-package-repository1. IntroductionIf your Redhat server is not connected to the official RHN repositories, you will need to configure your own private...
View ArticleWhat is UMASK and how to set UMASK in Linux/Unix?
http://www.linuxnix.com/2011/12/umask-define-linuxunix.htmlUMASK(User Mask or User file creation MASK) is the default permission or base permissions given when a new file(even folder too, as Linux...
View Article3D Robotics for open source drones- your plastic flying robot buddy
http://nextbigfuture.com/2013/04/3d-robotics-for-open-source-drones-your.html3D Robotics is the leading open source unmanned aerial vehicle (UAV) technology company. It was founded in 2009 by Chris...
View ArticleWhy Use Xen?
http://www.linux.com/news/enterprise/systems-management/717553-why-use-xenAt the Linux Foundation Collaboration Summit in April, the Xen Project announced that it was now a Collaborative Project of the...
View ArticleCreate and Restore manual Logical Volume Snapshots
http://how-to.linuxcareer.com/create-and-restore-manual-logical-volume-snapshots1. IntroductionBy creating a Logical Volume snapshots you are able to freeze a current state of any of your logical...
View ArticleInstall Innotop to Monitor MySQL Server Performance
http://www.tecmint.com/install-innotop-to-monitor-mysql-server-performanceInnotop is an excellent command line program, similar to ‘top command‘ to monitor local and remote MySQL servers running under...
View ArticleUnix tip: Using Bash's regular expressions
http://www.itworld.com/operating-systems/355273/unix-bashs-regular-expressionsBash has quietly made scripting on Unix systems a lot easier with its own regular expressions. If you're still leaning on...
View ArticleOpen Source Apps: the Monster List
It's become something of an annual tradition at Datamation to end the year with a gigantic compilation of all the open source software we've surveyed over the past twelve months or so. (See 2010's Open...
View ArticleHow to write CentOS initialization scripts with Upstart
http://www.openlogic.com/wazi/bid/281586/How-to-write-CentOS-initialization-scripts-with-UpstartOn Linux systems, initialization (init) scripts manage the state of system services during system startup...
View ArticleWine for advanced users and developers (Build and run windows apps without...
http://www.linuxuser.co.uk/tutorials/wine-for-advanced-users-and-developersWhile Linux has one of the largest software catalogues on the planet, there are still many software applications which are...
View Article