WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »


In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »


Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »


Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »


The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »

  • cPHulk

    Security is the primary concern for every customer. Due to advancements in hacking methods and cyber technologies it is high time that we need to ensure the security of the servers and, in turn, the websites. With the advent of control panels, it has become easier to administer the server and strengthen the server’s security…. Read more »

    Read More
    Posted on February 11, 2016 by
  • DDoS

    Denial-of-service (DDoS) is a common cyber threat. It is an attempt to make a resource unavailable to the intended users. This is possible through temporarily interrupting or suspending services of a host connected to the Internet or by preventing the resource from accessing traffic generated from multiple sources. Here the attacking source will have more… Read more »

    Read More
    Posted on February 11, 2016 by
  • SELinux, a useful security mechanism

    Security-Enhanced Linux (SELinux) is a security mechanism implemented in the kernel and it provides Mandatory Access Control (MAC). The significance of SELinux lies in the fact that in its absence only traditional discretionary access control (DAC) methods like setting file permissions can only be used to set file access privileges among various users. In DAC… Read more »

    Read More
    Posted on December 31, 2015 by

    By virtue of being open source software, Varnish was primarily designed as an HTTP accelerator focussing on content dynamic websites. It is exclusively focussed on HTTP against any other network protocols. It is often used by high-traffic websites including online newspapers. Installing Varnish can speed up a website while reducing the load on the web… Read more »

    Read More
    Posted on December 31, 2015 by
  • Best PHP handler for your Website

    You must have heard about PHP handlers if your website was developed using PHP codes. This article narrates how PHP handlers work for the websites. Before setting up the PHP handler, it’s advisable to understand the working of each PHP handler so that you can choose the best option for the PHP scripts used. The… Read more »

    Read More
    Posted on December 15, 2015 by

    A hyper-converged infrastructure is a software-related approach that combines storage, computation, network and virtualization technologies as one physical unit. This architecture allows in managing complicated technologies as a single unit. In short it is a sum up of all the data centre services. In the typical legacy environments, there have to be separate administrative and… Read more »

    Read More
    Posted on December 14, 2015 by
  • Lynx

    Introduction Lynx is simply a web browser for command line interface. It is a fully-featured World Wide Web (www) client which shows the web page contents in a simple terminal. Here the plain ASCII text is displayed without including the multimedia contents of the web page. The hypertext markup language (HTML) can be viewed using… Read more »

    Read More
    Posted on November 30, 2015 by

    Ping is a utility product that you can rely on when your PC is encountered with network issues out of the blue. This simple packet testing agent boasts of an incredible legacy and a successful strategy it often relies on. This blog discusses the modus operandi of Ping. It was Mike Mmuuss, inspired by David… Read more »

    Read More
    Posted on November 19, 2015 by
  • Google Indexing and Related Issues

    When a new site is created, the best way to popularize it is through the search engine Google. For this to work effectively, Google needs to index the site. Normally indexing is a time-consuming process. But it can be made faster if you can keep relevant contents as per the standards set by Google. Listed… Read more »

    Read More
    Posted on October 14, 2015 by
  • Google’s QUIC Protocol to speed up the Internet

    Quick UDP Internet Connections (QUIC) is an experimental protocol proposed by Google, which is designed to provide security and reliability along with reduced connection and transport latency. Google has already deployed QUIC protocol in their servers and do client implementation in the Chrome web browsers. The main idea behind QUIC is to use the UDP… Read more »

    Read More
    Posted on October 5, 2015 by
  • CloudLinux, for those who are concerned about website speed

    A sudden increase in load spikes due to high traffic into the websites and slow servers are some of the major problems that users and system administrators face every day. Cloud Linux, released in 2010, is a technology that most web hosting companies now adopt to counter these threats. This operating system is interchangeable with… Read more »

    Read More
    Posted on October 5, 2015 by
  • MOSH : An Interactive Remote Shell for Mobile Clients

    SSH (Secure Shell) is the most popular remote terminal application used nowadays, which runs inside a terminal emulator. Unfortunately, the SSH tool is not suitable for mobile networks. It has two major weaknesses. As SSH runs in TCP, it does not support roaming among IP addresses and SSH operates strictly in character-at-a-time mode, with all… Read more »

    Read More
    Posted on September 29, 2015 by