"python" tag
Arduino Mega

Building Image Processing Embedded Systems using Python, Part 1

The first part of this three-part series gives a brief overview of the embedded vision and the various components required to make it work. It also covers the installation procedure for the OpenCV…

In the lab...

Fedora Scientific: Open Source Scientific Computing

Fedora Scientific Spin is a Fedora Linux spin that aims to showcase the open source tools for scientific and numerical computing. It was first released officially with Fedora 16 in November 2011, and…

Time to Plone

Exploring Software: Plone with Schemas

Using Dexterity to extend and customise Plone. Last month, you tried Plone 4 and could create a schema interactively. However, at present, it does not seem to be possible to convert the interactive…

Way to the GUI Library

Spicing up the Console for Fun and Profit, Part 2

In the previous part of this article, we manipulated various aspects of the shell and terminals, like prompts, colours, cursor movements, etc, using escape sequences and utilities like tput. Now let’s move to…

Dennis MacAlistair Ritchie

Joy of Programming: The Legacy of C

Dennis Ritchie died on the 8th of October 2011, at the age of 70. His lasting contributions to computing include creating the C language, and co-creating the UNIX operating system. In his memory,…

A page after submitting for publication

Exploring Software: The New-Look Plone 4

If this is the first time you are hearing of Plone, should you use it? If so, how would you start and get a feel of what it can do? Plone is a…

Hello there, Foxies

A Letter to Foxy Developers

A look at what makes Mozilla Firefox the most developer friendly browser around, and how you can get the most out of the community-developed Mozilla Firefox. Mozilla Firefox is by far the most…

Syn Flooding

SYN Flooding using SCAPY and Prevention using iptables

DoS (Denial of Service) attacks against Web services make them unavailable for legitimate users, affecting the website owner’s potential business. These involve intentional consumption of network, CPU and memory resources. In this article,…

uhh, not the rootkits again

Chkrootkit — Eliminate the Enemy Within

Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a few detection options. This article continues on the same…

It should be all logical, no?

Exploring Software: GNOME and the Semantic Desktop

Currently, this is a work in progress. So will it mature fast enough and meet user expectations? The state of the semantic desktop in the GNOME desktop environment is still very fluid. Two…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.