WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »


In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »


Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »


Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »


The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • Mhddfs

      Combine Several Smaller Partition into One Large Virtual Storage. It is a fuse-based file system combines the several mount point to a single one. This mhddfs (fuse) file system allow to mount in a single one mount point. This will be helping to combines multiple hard drives or network file system. This system is… Read more »

    Read More
    Posted on August 15, 2016 by
  • N before S

    This is not a word game, still , we have to accept that NAS (Network-Attached Storage) had come to the scene long before SAN (Storage Area Network). Every data storage utility in this planet is debating on pros and cons of them for quite a long time. Let us break it down for the layman.We… Read more »

    Read More
    Posted on August 15, 2016 by

      Network Time Protocol is a TCP/IP protocol for synchronizing computer clock times over a network. Accurate time across a network is highly important. NTP servers a best solution for this concern! NTP was initiated by Dave L. Mills at the University of Delaware. He was trying to achieve a high accuracy time synchronization for… Read more »

    Read More
    Posted on August 9, 2016 by

    For some time, efforts have been going on to dissuade the use of browser fingerprinting thanks to the fraudulent practices it can corroborate. Tracking the users is still a cause of concern. The information of users is tracked under the assurance that it won’t be used for any other purposes. So far, there is no… Read more »

    Read More
    Posted on August 4, 2016 by
  • Things to remember – From Reseller hosting to Dedicated Servers.

    Businesses thrive on the vision to grow, which keeps them alive. The scenario is no different for hosting industry. Most hosting providers start with a Reseller package and gradually move to an isolated environment like a VPS or a Dedicated Server, after the revenue stream is well assured. Most entrepreneurs prefer to invest less at… Read more »

    Read More
    Posted on July 15, 2016 by
  • Apache Subversion (SVN)

    A version control system is considered as an inevitable tool for a developer. It is a repository of files that track and provide control over changes made in a source code. Each and every change made to the source code can be tracked along with who made the changes and why. The main advantage of… Read more »

    Read More
    Posted on July 15, 2016 by
  • HostDime India to End New Orders for Shared & Reseller Accounts

    HostDime always wants to keep pace with time. In other words, we always stand for cutting-edge technologies. It’s been more than a decade, since we started offering the base level Shared web hosting and Reseller hosting products. Now, we have come of age, testing and deploying newer hosting products that use the latest technology and… Read more »

    Read More
    Posted on June 16, 2016 by
  • SQL Injection

    SQL Injection (SQLI) is a code injection technique. Here, the attacker adds Structured Query Language code to a web input box. SQl is the universal language of databases and the injected SQL commands, which alter SQL statements, can compromise the security of a web application. The initial discussions related to SQL injection is dated back… Read more »

    Read More
    Posted on April 6, 2016 by
  • Responsive Web Design

    “You must be shapeless or formless, like water. When you pour water into a cup, it becomes the cup. When you pour water in a bottle, it becomes the bottle. When you pour water in a teapot, it becomes the teapot. Water can drip and it can crash. Become like water my friend.” The aforementioned… Read more »

    Read More
    Posted on March 11, 2016 by
  • Fault-tolerant Data Storage Subsystem: A Saviour

    The present invention relates in general to an improved data processing system and in particular to a fault-tolerant data storage subsystem, for utilization within a data processing system. More importantly, the data storage subsystem includes a multipath dynamically alterable hierarchical arrangement of storage device controllers. A typical data processing system generally includes one or more… Read more »

    Read More
    Posted on March 11, 2016 by
  • Raspberry Pi: Layman’s Linux Machine

    The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse. It is a capable little device that enables people of all ages to explore computing and help them to learn programming languages like Scratch and Python. It’s equally capable like… Read more »

    Read More
    Posted on February 24, 2016 by

    Lighttpd (pronounced as lighty) is an open source web server and is a rival to the world’s leading web server-Apache! Apache played a key role in the initial growth of World Wide Web. For decades, Apache has been ruling the roost when it comes to webservers. It is undoubtedly the most popular web server with… Read more »

    Read More
    Posted on February 24, 2016 by