WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »

KEEPASS

In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »

GlusterFS

Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »

Ganglia

Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »

vnStat

The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • Qubes OS for security

    Qubes is a highly secured Open Source operating system, which allows in creating multiple instances inside the desktop computing environment and helps in browsing trusted and untrusted sites using different virtual machines. Qubes 1 was introduced in September 2012 and later in September 2014, the Qubes team had released the second version, which was equipped… Read more »

    Read More
    Posted on February 15, 2017 by
  • FUEL – A POPULAR SOFTWARE DEPLOYMENT TOOL

    In the modern world, continuous deployments are required for software production. With prominent industries around us, Openstack has a definite potential to stay. Openstack is an open source platform that lets you combine computing, networking and storage systems within a single platform. The cloud based system is well appreciated as it is designed for horizontal… Read more »

    Read More
    Posted on January 30, 2017 by
  • Before choosing a Gaming server

    With innovation in technology online games are now challenging traditional games like Cricket and Football, when it comes to popularity. Both kids and grownups can play online games using smartphones or computers against anyone from any part of the world. Yes, online gaming has come of ages. When creative game developers are looking for innovative… Read more »

    Read More
    Posted on January 30, 2017 by
  • INFLUXDB – TIME SERIES DATABASE

    You must be aware of different types of databases. Here, let’s discuss about time-series database. This software is used for handling time series data. It can be used to store log and sensor data indexed over time. With the arrival of internet of things, logging of events is required across multiple applications. A number of… Read more »

    Read More
    Posted on January 30, 2017 by
  • OSIRIS for web portals via P2P

    Osiris Serverless Portal System commonly known as Osiris sps or Osiris, is a program used to create web portals via peer to peer networking (P2P) and autonomous centralized servers. Osiris is available for Linux Operating Systems and Microsoft Windows. For publishing information on the internet like blogs, content management systems or forums the data of… Read more »

    Read More
    Posted on January 20, 2017 by
  • Now Vim comes with a change

    Mr. Bill Joy, the co-founder of Sun Microsystems and BSD Unix, founded Vim after he failed to find a text editor tool in 1976. Emacs which was available then simply couldn’t meet his needs. When people with less technical knowledge rely on graphical interface of text editors, program developers prefer Vim or Emacs text editor… Read more »

    Read More
    Posted on January 20, 2017 by
  • Virtualization: A necessity in modern hosting

    Mainframe computers launched in the late 1950s are considered as the pioneers of Virtualization. Although virtualization has considerably advanced over the last 60 years, the driving need for this technology was always relevant from then. Its importance lies in the fact that, IT professionals always prefer controlled, secured and centralized management of computing environments in… Read more »

    Read More
    Posted on January 20, 2017 by
  • WebRTC for multiple tasks

    Real-time web communication plays a major role in the digital world. It can be used for multiple tasks but peer-to-peer audio and video communication is the notable feature. In 2011, Google has declared browser based real time communication (WebRTC) as their open source project. Earlier, the user needs to create an account and download special… Read more »

    Read More
    Posted on January 20, 2017 by
  • The most powerful pfSense firewall

    There are two types of firewalls in use. One is for system / server to control the users, services, ports, packets etc., and the other one is meant to control interactions between the system/server and another network. When you are connected with an external network the role of firewall is so crucial. Nowadays, every network… Read more »

    Read More
    Posted on January 20, 2017 by
  • Dirty COW Vulnerability

    More internet challenges are sprouting up as technology is sharpening its focus. One of the recently reported bugs is the privilege alteration or dirty COW vulnerability in the Linux kernel. The vulnerability emanates from the Resource Optimisation Strategy and Copy-on-write (COW) of the Kernel’s memory handler; hence it is termed as dirty COW [CVE-2016-5195. The… Read more »

    Read More
    Posted on January 20, 2017 by
  • HOSTING FOR FREE

    Free is a word that can attract all categories of customers. No matter how trivial the offerings are ‘Free’ can catch instant attention. For a beginner, Free Hosting Service is one of the few chances to seize, and is a perfect alternative for those amateur webmasters. What is Free Hosting? Free Hosting is a service… Read more »

    Read More
    Posted on January 20, 2017 by
  • Apache Sparking for Fast Computing

    Apache Spark is known for cluster computing designed for lightning fast computing. Although it is built on Hadoop MapReduce, it extends the MapReduce model to efficiently use more types of computations like Interactive Queries and Stream Processing. It also functions as a tutorial that explains the basics of Spark Core programming. The main feature of… Read more »

    Read More
    Posted on January 20, 2017 by