"Security" tag
magento

Ecommerce Store on Magento Platform Needs Security and Protection

Magento, an eBay product was earlier known as Varien. It is one of the most preferred eCommerce platforms and is being used by almost 30 percent of eCommerce websites. Magento combines the best…

94_Password Manager

A Peek into the Top Password Managers

We use passwords to ensure security and the confidentiality of our data. One of the biggest modern day crimes is identity theft, which is easily accomplished when passwords are compromised. The need of…

bitcoin-visual

An Introduction to Bitcoin: The Open Source Cryptographic Currency

Bitcoin is the new ‘virtual currency’ that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it is relatively new, much is not known about it….

Sheshagiri-Anegondi

‘The security threat on the cloud is now passe’

With the launch of Oracle 12c, Oracle has introduced the first database designed for the cloud. The Oracle Database 12c brings to customers a new multi-tenant architecture, by which the company attempts to…

The Connect Between Cloud Computing and Android Apps

Android, a Linux-based operating system whose code was released by Google under the Apache licence, is used primarily in touchscreen devices. It has a large developer community, which writes apps that expand the…

Manage Your Routine Tasks With Jenkins

This article shows how to set up Jenkins for email-notification, and build set-up on Linux- fedora core. In a software project life cycle, we are continuously integrating software on the version control, and…

Secure Your Network with Firewall Builder

A firewall isolates a trusted, secure internal network from another network like the Internet, which is not regarded as either trusted or secure. Firewall Builder is an open source product that makes it…

Set Up a Certificate Authority in RHEL5

Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for authentication purposes and you must have encountered a…

Protecting System Intents in Android

The last article on ‘Intents in Android’ covered the basics of one of Android’s important inter-application communication mechanisms intents. This article goes deeper into Android’s System Intents, and their security aspects, i.e., how…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.