hackers

As reported earlier CanSecWest conference was designed to test zero day vulnerability against three leading desktop operating systems. The result is out: [1] The MacBook Air went first [2] Windows Vista was cracked (hacked) on the last day of the contest [3] Linux remained undefeated Although several attendees tried to crack the Linux laptop, nobody […]

{ 0 comments }

Interesting idea that explains how to build awesome secure and portable system using Linux. From the article: I designed this system with both security and portability in mind. My system uses a Linux kernel and the entire thing, applications, personal data, etc, takes up 1GB of space. It is split up into two parts, the […]

{ 2 comments }

This is a must read if you or your organization associated with open source software project. If you are interested in a basic understanding of the legal issues that impact FOSS development and distribution, this primer is for you. The guide, written for developers, has sections on copyrights, trademarks, patents, organizational structure and other legal […]

{ 0 comments }

This is an interesting documentary video which traces the history of GNU, Linux, and the open source and free software movements. It features several interviews with prominent hackers and entrepreneurs (and hackers-cum-entrepreneurs), including Richard Stallman, Michael Tiemann, Linus Torvalds, Larry Augustin, Eric S. Raymond, Bruce Perens, Frank Hecker and Brian Behlendorf. The film begins in […]

{ 0 comments }

Practical Extraction and Report Language is hackers and sys admin’s # 1 choice language :) This site offers examples – perl one liners for command line use, a summary of important perl command line arguments, and how to convert between 1-liners and full Perl scripts. This page assumes the reader has a reasonable amount of […]

{ 1 comment }

Iptables has a special module called owner (ipt_owner), which is attempts to match various characteristics of the packet creator, for locally generated packets. It is valid in the OUTPUT and POSTROUTING chains.

{ 11 comments }

Verifying integrity of the tar balls or source code is an essential step, which makes sure that you are going to use guanine software (also know as checksum). Every Linux or UNIX admin should be aware of this test. However, what is a checksum? A checksum is a form of a very simple measure for […]

{ 2 comments }