As reported earlier CanSecWest conference was designed to test zero day vulnerability against three leading desktop operating systems. The result is out:  The MacBook Air went first  Windows Vista was cracked (hacked) on the last day of the contest  Linux remained undefeated Although several attendees tried to crack the Linux laptop, nobody […]
This is a must read if you or your organization associated with open source software project. If you are interested in a basic understanding of the legal issues that impact FOSS development and distribution, this primer is for you. The guide, written for developers, has sections on copyrights, trademarks, patents, organizational structure and other legal […]
This is an interesting documentary video which traces the history of GNU, Linux, and the open source and free software movements. It features several interviews with prominent hackers and entrepreneurs (and hackers-cum-entrepreneurs), including Richard Stallman, Michael Tiemann, Linus Torvalds, Larry Augustin, Eric S. Raymond, Bruce Perens, Frank Hecker and Brian Behlendorf. The film begins in […]
Practical Extraction and Report Language is hackers and sys admin’s # 1 choice language :) This site offers examples – perl one liners for command line use, a summary of important perl command line arguments, and how to convert between 1-liners and full Perl scripts. This page assumes the reader has a reasonable amount of […]
Someone might attack on your system. You can drop attacker IP using IPtables. However, you can use route command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. Matching packets are dropped (ignored) rather than forwarded, acting as a […]
Iptables has a special module called owner (ipt_owner), which is attempts to match various characteristics of the packet creator, for locally generated packets. It is valid in the OUTPUT and POSTROUTING chains.