"Security" tag
Nmap Scanning Techniques

Advanced Nmap: Scanning Techniques Continued

The earlier articles on Nmap had covered the basic features, the working of the TCP 3-way handshake, and some important scan types, along with their practical use. The third article in this series…

Advanced Nmap

Advanced NMap: Some Scan Types

A broad overview and the basic features of NMap have been covered in an earlier article in this series of articles on Nmap. In this article, we discuss in detail various NMap scan…

Security measures

Securing Apache, Part 2: XSS Injections

In the previous article in this series, we started our journey to a secured Apache by dissecting its internals. We then looked at various attacks against Web applications via injection flaws, beginning with…

Lock it up!

Securing Apache, Part 1: The Basics

Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security, this series of articles intends to cover the strengthening…

Mapping a network

Learning Nmap: The Basics

Nmap, the network mapping tool, is the starting point when analysing any network. It is an exciting tool — compact and power-packed. This article looks at the range of functions and options it…

The Art of Guard, Part 5: SELinux Logging

In the previous article in this series, we looked at allow rules in an SELinux policy. This month we’ll discuss SELinux error logs in order to decipher them and take corrective action.

SAFENTRIX: It’s Time to Kill e-mail Spam, for Free!

While there are numerous proprietary e-mail security solutions around, how many actually manage to live up to their claims? And who says that customer service and satisfaction never come free? LFY tries its best to search out a solution that addresses these concerns.

Subversion 1.6: Security Improvements Illustrated

Subversion 1.6.0 was released on 20th March, 2009 and included a lot of security improvements, which we explore in detail in this article.

The Art of Guard, Part 2: SELinux Modes and Policies

Let’s explore SELinux modes, and learn a few commands that will help in understanding SELinux policies better.

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.