"Security" tag
file

Secure a Linux Box through the Right File Permissions

This article discusses how a Linux machine can be controlled by assigning permissions for accessing files and directories to owner users, group members and other users. Advanced techniques for user and group management…

IoT

The Internet of things (IoT)

The IoT is a technology in the making and we can experience it in small ways, even now. The author presents an ‘appetite whetting’ article on it, highlighting its vast potential while also…

Evil

A Primer on Evil Twin Wireless Attacks

In a scenario where we are using freely available public wireless networks all the time, security considerations are vital. Wireless attacks can be launched on the unwary and unprepared in several ways. An…

magento

Ecommerce Store on Magento Platform Needs Security and Protection

Magento, an eBay product was earlier known as Varien. It is one of the most preferred eCommerce platforms and is being used by almost 30 percent of eCommerce websites. Magento combines the best…

internet infrastructure

The Most Popular Security Assessment and Server Hardening Tools

Enterprises require high levels of security for their computer systems. A server attack or a malware intrusion can cause incalculable damage. Prudence, therefore, is the keyword here. This article describes the most popular…

94_Password Manager

A Peek into the Top Password Managers

We use passwords to ensure security and the confidentiality of our data. One of the biggest modern day crimes is identity theft, which is easily accomplished when passwords are compromised. The need of…

bitcoin-visual

An Introduction to Bitcoin: The Open Source Cryptographic Currency

Bitcoin is the new ‘virtual currency’ that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it is relatively new, much is not known about it….

Sheshagiri-Anegondi

‘The security threat on the cloud is now passe’

With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a new multi-tenant architecture, by which the company attempts to…

The Connect Between Cloud Computing and Android Apps

Android, a Linux-based operating system whose code was released by Google under the Apache licence, is used primarily in touchscreen devices. It has a large developer community, which writes apps that expand the…

Manage Your Routine Tasks With Jenkins

This article shows how to set up Jenkins for email-notification, and build set-up on Linux- fedora core. In a software project life cycle, we are continuously integrating software on the version control, and…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.