Security Creating encrypted partition in linux The risk of systems getting physically compromise, particularly portable systems such as laptops, puts sensitive data at risk of compromise. Encrypting its data mitigates the risk of getting exposure if system is lost. By Kshitij Upadhyay 10 Feb 2018
Virtualization Creating ARM architecture environment inside x86/x64 linux If you want your hands on arm architecture assembly then you probably would be wondering how can I generate the *ARM* assembly or use ARM toolset in general inside my intel x86 or x64 architecture system. In this article we will explain you how you can do that by using qemu and chroot. By Shubham Dubey 9 Feb 2018
Security Reduce Security Risks with SELinux Discover SELinux, a security module that provides extra protocols to ensure access control security. It supports mandatory access controls (MAC) and is an integral part of RHEL’s security policy. By Kshitij Upadhyay 3 Feb 2018
Exploit Development Exploiting Off-by-One buffer overflow vulnerability Off-by-one vulnerability is little difficult to find and hence can be present in big softwares.It can cause due to not aware of fact if your string provided is not null terminating then strcpy will add a null terminator at the end of string, By Shubham Dubey 29 Jan 2018
Firmware Replace your proprietary bios with linux firmware Intel system comes with UEFI, UEFI is a proprietary and closed-source operating system that can be exploited.NERF (Non-Extensible Reduced Firmware), an open source software system developed at Google can replace almost all of UEFI firmware with a tiny Linux kernel and initramfs. By Shubham Dubey 5 Jan 2018
Containers Demystifying Linux Containers(LXC) Containers are the future when it comes to using and shipping applications. But Linux containers or LXC can be used for more than just that. This article covers the use of LXC on a daily basis as well as for production. By Shubham Dubey 2 Jan 2018
Security Sandboxing and program isolation in linux using many approaches (Part 2) Containers are tools for isolation which use namespaces to archive that.They are called light weight virtualization because they provide process level isolation only, means they depend on linux kernel. By Shubham Dubey 30 Dec 2017
Security Sandboxing and program isolation in linux using many approaches (Part 1) You can secure your linux system by isolating the malicious program or risky tasks using Sandboxing in different ways to stop it from affecting your main system.Sandboxing means providing a safe environment for a program or software so you can play around it without hurting your system By Shubham Dubey 29 Dec 2017
Virtualization Data Storage virtualization in Linux (Part 2) In the previous part we talked about how we can create sparse file storage and create file system to mount or share across network. Now we will look into some common disk operations that we can do with this storage like scaling, encryption etc. By Shubham Dubey 28 Dec 2017
Virtualization Data Storage virtualization in Linux (Part 1) Learn how to use file storage in Staas services. In file storage we create a file and use it as our virtual partition then format it in desire file system and mount it. All the operation we do in our real disk partition(/dev/sda*) can be done on that with some little tricks or manipulation. By Shubham Dubey 28 Dec 2017
Tutorial Finding file information using different methods Information about files content can be found using different methods in both windows and linux systems. This knowledge can be handy if you are developing a program or script that is dealing with files. By Shubham Dubey 27 Dec 2017
Linux How to boot linux iso without usb on corrupted bios of lenovo laptops Grub2 have the capability to boot directly from iso file present in any of your hard drive storage. Using this feature most Linux distributions as well as popular rescue CDs can be booted directly from an ISO file. By Shubham Dubey 27 Dec 2017