WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »


In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »


Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »


Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »


The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »


    Cloud computing is the latest advancement in technology and the key concept here is virtualization. Virtualization software separates a physical computing device by dividing it into one or more ‘virtual’ devices, each of which can be easily used and managed to perform computing tasks. The operating system–level virtualization such as Docker, creates a scalable system… Read more »

    Read More
    Posted on October 17, 2016 by

    Website and application hosting are emerging as highly potential areas in the service industry. As hosting technologies are getting updated quite often, it is important for the techies to update themselves to keep pace with technology. Grid computing technology has been around for a long time but was never been properly introduced into the area… Read more »

    Read More
    Posted on October 7, 2016 by
  • A Powerful System Monitoring Tool called Glances

    The System Administrator relies on monitoring tools to monitor and debug the system performance every day. A number of system monitoring tools are now available in Linux distributions. System admins always rely on the top command that comes as default with every Linux distributions. Although the tools come in a variety of options, nothing gives… Read more »

    Read More
    Posted on October 3, 2016 by
  • Advantages of Docker technology

    This blog helps you to understand in-depth about ‘Docker’ technology and its benefits. The technology is useful in distributing the application you are using without worrying about the compatibility requirements. From a layman’s viewpoint, the docker packages the application with its entire dependencies like libraries, binaries etc., that are required to run the software or… Read more »

    Read More
    Posted on October 3, 2016 by
  • Why KVM VPS is required ahead of Shared and Reseller Hosting ?

    HostDime now focuses more on Managed VPS/Virtual Machines based around Virtualization technology known as KVM (Kernel-based Virtual Machine). Using KVM VPS product we can offer shared and reseller hosting in a more private, customizable, and secured environment. Our state-of-the-art data center hosts these SSDs and it has been upgraded with a fiber 10 Gbps, which… Read more »

    Read More
    Posted on September 16, 2016 by
  • Restricted Shells: rssh and scponly

    Rssh and scponly are two of the most important shell commands used by sysadmins and they limit the operations for a Linux user. This tool can create a particular user who is only allowed to copy files via scp and hence won’t be permitted to log into the system’s command line. If you possess online… Read more »

    Read More
    Posted on September 16, 2016 by
  • Why so VPS ?

    Website will play a key role in building your business and so it is important to improve the same as the business grows. Most of the entrepreneurs prefer to host their websites in basic shared hosting packages, considering the low cost and fully managed services. But as the business grows the number of visits will… Read more »

    Read More
    Posted on September 16, 2016 by
  • Engintron

      Why Engintron..? Undoubtedly Apache HTTP software is the most popular web server used across the world. It is the web server component of the popular LAMP. It was developed in the year 1995. It was developed by Robert McCool. Because of its wide popularity it has gained documentation and integrated supports from other software… Read more »

    Read More
    Posted on September 15, 2016 by
  • Features of REDIS

    Redis or Remote Dictionary Server, is an in-memory data structure that can be used as cache, database and message broker. The open source software supports data structures like lists, hashes, strings, sets, bitmaps, sorted sets with range queries and hyperloglogs. Since June 2015, the development of Redis is sponsored by Redis Labs. Earlier, it was… Read more »

    Read More
    Posted on September 2, 2016 by
  • LiFi – The next generation in Connectivity

    Technology and innovations have revolutionized the way we live and they in fact made our life easy. Earlier people used to communicate by writing mails and wait for months to get a reply. Currently, we have audio/ video conferencing features at our finger tips in the form of mobile / other hand-held devices. The other… Read more »

    Read More
    Posted on September 2, 2016 by
  • The Impact of Hardware Components in the Performance of a Dedicated Server

    Most people believe that basic dedicated servers can deliver the best performance for their websites. This is not true as website performance is also determined by other factors like traffic to the website, coding side optimization and load on the server. Also the hardware configuration should be efficient enough to handle the amount of traffic…. Read more »

    Read More
    Posted on August 23, 2016 by
  • Graph Databases : An Artistic Approach to Data Storage

      Graph databases, in a general way, are databases that use graph structures for meaningfully association of data with nodes, edges and properties to represent and store data. There are a lot of graph databases such as AllegroGraph, ArangoDB, Blazegraph, Bitsy, Cayley, Filament, graphd, Horton, IBM System G Native Store, MarkLogic, Neo4j, Ontotext GraphDB, Oracle… Read more »

    Read More
    Posted on August 15, 2016 by