WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »

KEEPASS

In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »

GlusterFS

Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »

Ganglia

Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »

vnStat

The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • Automation-Tools-1

    WAF, a Popular Automation Tool

    WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

    Read More
    Posted on June 5, 2017 by
  • nmap

    NMAP, The Free and Open Source Tool

    In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

    Read More
    Posted on June 5, 2017 by
  • 23143B462-0

    Features of NewSQL

    NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

    Read More
    Posted on June 5, 2017 by
  • memsql+logo

    MemSQL : SQL based Database Management System

    MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »

    Read More
    Posted on June 5, 2017 by
  • keepass-plugins-670x335

    KEEPASS

    In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

    Read More
    Posted on June 5, 2017 by
  • kali

    Kali Linux: Professional Penetration-Testing Distro

    Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

    Read More
    Posted on June 5, 2017 by
  • emberify_iot_1-1262x710

    Internet of Things (IOT)

    The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »

    Read More
    Posted on June 5, 2017 by
  • glusterfs-square-logo

    GlusterFS

    Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »

    Read More
    Posted on June 5, 2017 by
  • logo_small

    Ganglia

    Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »

    Read More
    Posted on June 5, 2017 by
  • screenshot-humdi.net-2017-04-01-12-39-47

    vnStat

    The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

    Read More
    Posted on April 1, 2017 by
  • OpenNebula-Logo-2

    OpenNebula

    In modern days, many varieties of tools are available for developing and managing cloud environment. OpenNebula is one such open source collection of tools for cloud computing and data centre virtualization and it comes free of cost. The biggest highlight of OpenNebula is its capability to manage heterogeneous infrastructure. It can be used to create… Read more »

    Read More
    Posted on April 1, 2017 by
  • Kubernetes

    Kubernetes

    Kubernetes otherwise K8s is a powerful system for managing application in a clustered environment. The containerised environment provides container-centric infrastructure. The main thing that differentiates Kubernetes from other container application is, it can deploy your application quickly and predictably. It optimises the use of hardware, scale the application on the fly and seamlessly roll out… Read more »

    Read More
    Posted on April 1, 2017 by