WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »

KEEPASS

In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »

GlusterFS

Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »

Ganglia

Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »

vnStat

The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • Server Migration: Significance and Precautions

    The main intention behind the launching of a website is to introduce a company and its services to the worldwide customers, through the wide landscape of Internet. It enables in building a brand much faster and reaching customers in a cost effective manner. It saves huge investments required for non-focussed advertising and manpower required for… Read more »

    Read More
    Posted on December 15, 2016 by
  • The need for RAID

    You may already be aware of the word ‘RAID’ and you are here to know more about the RAID levels. An introduction to RAID is given below for the benefit of newbies. The word RAID actually stands for Redundant Array Independent Data. Usually, hard disks of our computers are directly connected to the motherboard. But… Read more »

    Read More
    Posted on December 15, 2016 by
  • Why Disk Encryption is important?

    Data security has become one of the biggest concerns among Internet users. News on data theft from websites has become common, now days. Although the websites have the responsibility to protect our data, there is a lot that we as end users can do for our own safety. Using strong passwords, encrypting computer hard disks… Read more »

    Read More
    Posted on December 15, 2016 by
  • The use of Clonezilla

    Image files are helpful in countering now-defunct PC issues. It is really helpful, if a clone image file gets automatically generated as a backup. This will help in securing the data by easily restoring the same. Currently, most cloning software is expensive to own or difficult to use. Hence the need of the hour is… Read more »

    Read More
    Posted on December 15, 2016 by
  • Before choosing a Domain Name for your Company

    In the modern world, Organizations rely on websites to introduce their services to the worldwide audience, thanks to the medium of internet. In fact, internet helps in exploring the new markets at a very low cost. The domain name is an integral part of the website, which conveys the company’s identity to the world. So… Read more »

    Read More
    Posted on December 13, 2016 by
  • Shared Memory and Its Features

    Shared Memory helps in passing on data between programs. A memory portion created by a program can be accessed by other processes, if allowed. In other words, Shared memory is an extra portion of memory that is attached to some address spaces, which the owners can use. Here all the processes can access and share… Read more »

    Read More
    Posted on November 14, 2016 by
  • The different aspects of Semaphores

    ‘Semaphore’ is a term used for a variable in the Operating System, which acts as a counter. When multiple processes try to access the same resource or file continually, then access to the particular file should be controlled by assigning a value to the semaphore. A Semaphore is like an integer, with three differences. The… Read more »

    Read More
    Posted on November 14, 2016 by
  • Vdbench a powerful benchmarking tool

    Vdbench, is counted as one of the most powerful benchmarking tools and can also be used as a GUI tool or a CLI tool. It can work on different platforms like Windows, Solaris, and Linux. It is a controlled I/O load monitoring tool for storage systems and gains control over workload parameters like I/O rate,… Read more »

    Read More
    Posted on November 9, 2016 by
  • Windows Sub System for Linux

    A few years back, it was impossible to run Linux packages/command in Windows. The technology has evolved over time and now Ubuntu-on-Windows is possible, without using virtual box VMware… The anniversary edition of Windows 10 comes with additional features for Windows developers, which include a complete Ubuntu based Bash shell that can run Linux packages… Read more »

    Read More
    Posted on November 9, 2016 by
  • Penetration Testing

    Penetration testing otherwise known as pen testing helps in finding out vulnerabilities associated with networks and web applications. The scope and nature of pen test highly depends on the drivers of the Organization, who can influence targeted goals like target selection, scope, assumption etc., and it is done for various reasons. Example – If the… Read more »

    Read More
    Posted on October 28, 2016 by
  • OPNsense a user friendly firewall

    The growth of internet has prospered unethical practices like hacking and intrusion. The threats and vulnerabilities can prove lethal for companies. No wonder, measures are now taken to secure the network environment and still there are reports on a daily basis about the cracking attempts. A number of hardware and software are now available to… Read more »

    Read More
    Posted on October 17, 2016 by
  • Netcat, a powerful computer networking utility

    Netcat is a powerful computer networking utility that performs large number of network related tasks and stores output into a file. It is designed to be a dependable utility, which can run independently or in parallel with other programs and scripts. In short, Netcat is an open source tool that comes with innumerable functionalities. The… Read more »

    Read More
    Posted on October 17, 2016 by