Facebook Twitter


Ebook - List of freely available programming books. Why is RAID So Important for Databases? OpenVMS. Secure Erase your SSD. The SSD drives have already hit the market and their arena is shaping up to be fierce with a lot of players.

Secure Erase your SSD

For those who have never heard of the SSD technology, here is a brief explanation: The SSD (Solid State Drive) is another storage unit for your computer, similar to your hard drive – but zillions times faster! Yes sir, not mechanical components here, so if you look under the hood of your SSD, you won’t find any magnetic head & platters, but just a plain PCB board. Cyber Attacks Explained: Packet Crafting. Protect your FOSS-based IT infrastructure from packet crafting by learning more about it.

Cyber Attacks Explained: Packet Crafting

In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward to describe a technically advanced attack that could badly impact networks because it is tough to detect. Packet crafting is a commonly used and yet complex method to exploit vulnerabilities and, hence, it is important for network administrators to know more about it, and also to understand the various ways to protect their infrastructure against it. We will also look at how to protect FOSS-based systems from a packet crafting attack.


Patents/ Mac. Linux. Linux / Unix: chroot Command Examples. I am a new Linux and Unix user.

Linux / Unix: chroot Command Examples

How do I change the root directory of a command? How do I change the root directory of a process such as web-server using a chroot command to isolate file system? How do I use a chroot to recover password or fix the damaged Linux/Unix based environment? Each process/command on Linux and Unix-like system has current working directory called root directory of a process/command.


Web Design.