WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »


In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »


Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »


Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »


The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • Rising Cloud & Vanishing Tapes

    The rising request for the Cloud is bringing an end to the era of so called Tape silo (also known as Tape robot or Tape Jukebox) though not all of a sudden, but gradually. The Tapes are basically the major source for Mainframe storage medium. Whenever the Mainframe word is used, people do think of the… Read more »

    Read More
    Posted on January 29, 2015 by
  • Server Data Protection – Cost Saving Tips

    In the technology oriented modern era, need for data protection holds immense importance. An unprotected data carries the risk of being easily accessible. Hence the importance of disaster recovery to modern businesses is unavoidable. Natural or man-made reasons create disasters and the recovery techniques always come at a price. It is important for businesses to… Read more »

    Read More
    Posted on January 29, 2015 by
  • LINUX : The apt choice when it comes to Security

    In the recent findings by UK’s Communications-Electronics Security Group (CESG), declared that Linux is the apt choice when it comes to security.

    Read More
    Posted on January 29, 2015 by
  • Microsoft Exchange, as Hosted Servers

    With the growth of technologies, soft communication and its media have also increased in larger volumes in different formats like e-mail, voice mail, instant message etc… As time progresses, these communication grow bulkier and hence there is a need to eliminate this overload like, specifying rules on how to communicate each other without mixing up the… Read more »

    Read More
    Posted on January 29, 2015 by
  • CMS based Websites Face Major Threat

    In today’s day to day life, people around the globe rarely spend much of their time in front of a Television or the newspapers in comparison to the Internet world to grasp the daily happenings. People depend on the Content Management Systems (CMS) to know more of the surrounding NEWS.

    Read More
    Posted on January 29, 2015 by
  • How to protect yourself from SPAM?

    SPAM (Small Pointless Annoying Messages, Sales promotional Advertising Message OR Simultaneously Posted Advertising Messages). As the name indicates SPAM are junk/unsolicited bulk messages send with a purpose of advertising needs. SPAM’s are send using the electronic messaging system. The SPAM email’s may contain links which can lead the recipient to a phishing website or clicking… Read more »

    Read More
    Posted on January 29, 2015 by
  • SaaS (Software as a Service)

      In today’s business world, the need for software is indisputable. From shipment tracking to inventory management, software applications hold the key. The days of running software on internal infrastructure have gone, as companies are now migrating to software as a business model (Saas) from software license purchase model. Saas is one of the cloud… Read more »

    Read More
    Posted on January 29, 2015 by