Introduction to extended attribute

Introduction to extended attribute

You are root on your system, you do a rm of a file and get a “rm: can not remove` test ‘: Operation not permitted” is this possible? Yes, if there are any special extended attributes set on your filesystem. The “interesting” thing is that also some rootkit use these attribute after have changed some […]

7 Practical uses of Openssl

7 Practical uses of Openssl

In a previous article we saw the basics of encryption and asymmetric key used in the e-mail. On Linux the most used and popular programthat deals with security and encryption is OpenSSL . OpenSSL is an open source implementation of the SSL and TLS protocols. The core library (written in the C programming language) implements […]

How to handle files with strange names

How to handle files with strange names

Sometimes it happen to find in our file system files with strange names, with that i means files with non-alphanumeric characters or spaces between different words, maybe uploaded by users, or files produced by mistake by someone or some program, and unfortunately is often not trivial to do a mv < file > or rm […]