Tagged articles
29 articles
Page 1 of 1
ITPUB
ITPUB
Apr 28, 2026 · Industry Insights

Why Microsoft Almost Adopted the Forward Slash for Windows Paths

The article traces the 40‑year history of Windows’ backslash path separator, revealing that a 1983 compatibility compromise between Microsoft and IBM—rooted in DOS command‑line conventions—prevented the adoption of the Unix‑style forward slash, leaving a lasting legacy for developers.

CompatibilityDoSUnix
0 likes · 7 min read
Why Microsoft Almost Adopted the Forward Slash for Windows Paths
Linux Tech Enthusiast
Linux Tech Enthusiast
Sep 26, 2025 · Operations

Seven Practical Ways to Use the Ping Command

This article walks through seven common ping command usages—including basic connectivity checks, continuous ping, name resolution, custom packet counts and sizes, route recording, and batch subnet scanning—explaining each option's output, typical values, and security considerations.

DoSLinuxTTL
0 likes · 8 min read
Seven Practical Ways to Use the Ping Command
Cognitive Technology Team
Cognitive Technology Team
Aug 24, 2025 · Information Security

How DoS Attacks Work and How to Defend Against Them

This article explains what denial‑of‑service (DoS) attacks are, describes their underlying principles and common variants such as SYN, UDP, ICMP, and HTTP floods, and outlines comprehensive defense strategies including firewalls, IDS, CDN, multi‑active architectures, SYN cookies, rate limiting, and cloud‑based protection services.

DDoSDefense StrategiesDenial of Service
0 likes · 9 min read
How DoS Attacks Work and How to Defend Against Them
21CTO
21CTO
Apr 11, 2025 · Fundamentals

FreeDOS 1.4 Released: New Features, Tools, and Installation Tips

FreeDOS 1.4, the newest fully open‑source DOS‑compatible OS, arrives three years after 1.3 with a faster development pace, new Freecom shell commands, an improved fdisk, the mTCP networking suite, updated installation media, and detailed notes on components, memory requirements, and virtual‑machine usage.

DoSFDIMPLESFreeDOS
0 likes · 7 min read
FreeDOS 1.4 Released: New Features, Tools, and Installation Tips
21CTO
21CTO
Dec 24, 2024 · Fundamentals

Exploring SvarDOS: A Minimalist DOS Package Manager for Modern PCs

SvarDOS is a newly independent open‑source DOS distribution that fits on a floppy, supports networking, runs classic software like MS Word 6, and offers a modern package manager with online updates, making retro computing on virtual machines and old hardware both practical and enjoyable.

DoSFreeDOSSvarDOS
0 likes · 10 min read
Exploring SvarDOS: A Minimalist DOS Package Manager for Modern PCs
Java Architecture Diary
Java Architecture Diary
Aug 16, 2024 · Information Security

Fix Critical Spring Framework CVE-2024-38808 & CVE-2024-38809

Spring Framework versions up to 5.3.38 and certain Spring Boot releases contain two severe DoS vulnerabilities (CVE-2024-38808 and CVE-2024-38809); this guide explains their impact, affected products, and provides detailed mitigation steps, including version upgrades and configuration changes to secure your applications.

Backend DevelopmentCVE-2024-38808CVE-2024-38809
0 likes · 6 min read
Fix Critical Spring Framework CVE-2024-38808 & CVE-2024-38809
21CTO
21CTO
Aug 7, 2024 · Fundamentals

The Last DOS Word Processor: Uncovering WordStar 7’s Legacy

This article chronicles the rise and fall of WordStar, the once‑dominant DOS word‑processing software, its final 7.0d release bundled for macOS, the passionate advocacy of author Robert J. Sawyer, and the modern tools that keep the classic alive for today’s writers.

DoSLegacy SoftwareWordStar
0 likes · 6 min read
The Last DOS Word Processor: Uncovering WordStar 7’s Legacy
IT Services Circle
IT Services Circle
Jan 2, 2024 · Fundamentals

The Rise of Text‑Mode IDEs in the Late 80s and Early 90s

In the late 1980s and early 1990s, DOS‑based text‑mode Integrated Development Environments like EDIT.COM and Borland Turbo C++ offered programmers full editing, compilation, debugging, and project management capabilities despite lacking graphical interfaces, shaping early software development practices before graphical IDEs became prevalent.

DoSIDETurbo C++
0 likes · 3 min read
The Rise of Text‑Mode IDEs in the Late 80s and Early 90s
Open Source Linux
Open Source Linux
Jul 21, 2023 · Fundamentals

From Altair to Windows 11: The Epic Evolution of DOS and Windows

This article traces the complete history of Microsoft's DOS and Windows families, from the 1975 Altair 8800 and early CP/M systems through the acquisition of QDOS, the rise of MS‑DOS, and the successive Windows releases that shaped personal computing up to the modern Windows 11 era.

DoSIBMMicrosoft
0 likes · 13 min read
From Altair to Windows 11: The Epic Evolution of DOS and Windows
Java Architecture Diary
Java Architecture Diary
Mar 22, 2023 · Information Security

Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It

This article explains the Spring Framework DoS vulnerability (CVE‑2023‑20861), outlines affected versions, details the root cause in SpEL expression handling, and provides step‑by‑step mitigation and upgrade instructions for both Spring Framework and Spring Boot, along with references and security considerations.

CVE-2023-20861DoSMitigation
0 likes · 7 min read
Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2023 · Information Security

Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases

This article explores the fundamentals and varieties of DoS and DDoS attacks, explains how special‑crafted packets, floods, SYN, UDP, and reflection/amplification methods work, and illustrates real‑world hacker groups such as DD4BC, Armada Collective, Fancy Bear, and their ransom tactics.

DDoSDoScybercrime
0 likes · 12 min read
Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases
Laravel Tech Community
Laravel Tech Community
Dec 19, 2021 · Information Security

Apache Log4j 2.17.0 Release Fixes CVE‑2021‑45105 and Other Vulnerabilities

Apache Log4j 2.17.0 has been released, addressing CVE‑2021‑45105 and fixing recursive string‑replacement vulnerabilities that could cause StackOverflowError DoS attacks, while also tightening JNDI usage and correcting several configuration and appender issues, with recommended mitigation steps for earlier versions.

CVE-2021-45105DoSJava
0 likes · 4 min read
Apache Log4j 2.17.0 Release Fixes CVE‑2021‑45105 and Other Vulnerabilities
Liangxu Linux
Liangxu Linux
Oct 7, 2021 · Information Security

How a 13‑Character Fork Bomb Crashes Linux and How to Stop It

The article explains the 13‑character fork bomb created by Jaromil in 2002, shows how it exhausts system resources by recursively forking processes, demonstrates its impact on a cloud VM, and provides practical prevention methods using ulimit and limits.conf.

DoSLinuxShell
0 likes · 6 min read
How a 13‑Character Fork Bomb Crashes Linux and How to Stop It
Open Source Linux
Open Source Linux
Sep 23, 2021 · Information Security

Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS

An in‑depth overview of network security threats reveals how attacks exploit vulnerabilities across TCP/IP layers—detailing ARP spoofing, DoS (including SYN flood), and DNS hijacking—and offers practical defense strategies such as packet analysis, firewall hardening, and proactive monitoring.

ARP AttackDNSDoS
0 likes · 10 min read
Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS
Open Source Linux
Open Source Linux
Sep 10, 2021 · Information Security

How a 13‑Character Fork Bomb Crashes Linux and How to Stop It

Jaromil’s 13‑character Linux fork bomb demonstrates how a tiny Bash function can recursively spawn processes, exhausting system resources and causing a denial‑of‑service crash, while the article explains its mechanics, shows a live cloud‑VM demo, and provides practical mitigation using ulimit and security limits.

DoSLinuxShell scripting
0 likes · 5 min read
How a 13‑Character Fork Bomb Crashes Linux and How to Stop It
php Courses
php Courses
Nov 2, 2020 · Information Security

Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS

This article explains common web security threats—including XSS, SQL injection, CSRF, CC, DoS, and DDoS—detailing their mechanisms, potential impacts, and practical defense strategies such as input validation, token usage, Referer checks, and resource limiting to protect applications and servers.

DoSSQL injectionXSS
0 likes · 14 min read
Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS
ITPUB
ITPUB
May 16, 2020 · Fundamentals

Exploring Lei Jun’s Elegant 1994 Assembly TSR: RAMinit Source Code

This article presents the complete 1994 assembly source of Lei Jun’s RAMinit TSR program, explains its historical context, describes its hot‑key removal logic, interrupt hooking, environment backup and restoration, and details the low‑level XMS/EMS memory management routines.

AssemblyDoSTSR
0 likes · 27 min read
Exploring Lei Jun’s Elegant 1994 Assembly TSR: RAMinit Source Code
ITPUB
ITPUB
May 5, 2020 · Fundamentals

Exploring Lei Jun’s Elegant 1994 DOS TSR Assembly: Full Source and Analysis

This article presents the complete 1994 assembly source of Lei Jun’s RAMinit TSR program, explains its background, key functions such as hot‑key handling, interrupt vector replacement, and memory management, and highlights its limitations to real‑mode DOS environments.

DoSLegacy CodeRetro Programming
0 likes · 26 min read
Exploring Lei Jun’s Elegant 1994 DOS TSR Assembly: Full Source and Analysis
Liangxu Linux
Liangxu Linux
Apr 25, 2020 · Fundamentals

Inside Lei’s 1994 RAMinit TSR: Full Assembly Source and Analysis

This article presents the complete assembly source of the RAMinit TSR program written by Lei in 1994, explains its purpose as a hot‑key‑driven memory‑management utility for DOS, describes its interrupt‑vector handling, memory‑copy routines, and includes detailed comments that reveal the inner workings of this historic piece of system software.

AssemblyDoSLegacy Code
0 likes · 27 min read
Inside Lei’s 1994 RAMinit TSR: Full Assembly Source and Analysis
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks

The article explains how the Linux kernel’s SYNPROXY feature, introduced in version 3.13, effectively mitigates SYN flood DoS attacks by acting as a gateway, validating handshake cookies, and dramatically reducing kernel soft‑IRQ load during testing on Debian and SLES‑12.

DoSLinuxSYNPROXY
0 likes · 2 min read
How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks