WAF, a Popular Automation Tool

WAF is one among the various popular automation tools like Apache Ant, Bazel, CMake, and Make. Automation tools are used to facilitate the compilation and installation of an application/software/package in a system. The importance of automation can be best explained through an imaginary situation like 100 coded files required to be compiled to complete the… Read more »

NMAP, The Free and Open Source Tool

In an unsecured scenario, security tools are inevitable to safeguard your system. A plethora of security tools are available in the market for network administrators to make use of. These are paid tools, which are based on FOSS (Free and Open Source Software). Here, let’s have a look at Nmap. Nmap stands for Network Mapper…. Read more »

Features of NewSQL

NewSQL is a class of modern Relational Database Management System that seek to provide the same scalable performance of NoSQL systems for Online Transaction Processing (OLTP) and read-write workloads, while maintaining the ACID guarantees of a traditional database system. The term was first used by 451 Group analyst Matthew Aslett in a 2011 research paper,… Read more »

MemSQL : SQL based Database Management System

MemSQL is a distributed SQL based Database Management System. On April 23, 2013, MemSQL launched its first generally available version of the database to the public. In order to process highly volatile workloads, MemSQL combines lock-free data structures and just-in-time compilation (JIT). More specifically, MemSQL implements lock-free hash tables and lock-free skip lists in memory… Read more »


In modern times, we often deal with voluminous number of passwords. For some websites too, we need passwords and applications to log in. Cpanel, WHM, mail accounts and FTP accounts require passwords to gain access. Hence it is not strange that people opt for easy passwords and also they tend to reuse passwords for multiple… Read more »

Kali Linux: Professional Penetration-Testing Distro

Kali Linux, a Debian based Linux distribution is funded and maintained by Offensive security, a training company that deals with information security. It has more than 300 tools, which are used for Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux was released on March 13, 2013, and it was a total rebuilt… Read more »

Internet of Things (IOT)

The Internet of Things (IoT) refers to the network of physical objects that feature an IP address for Internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices. Physical devices like buildings can collect and exchange data, when they are embedded with electronics, software and network connectivity. As the objects represent themselves digitally,… Read more »


Gluster is one of the best open source storage platforms, which mainly focuses on dividing the storage and managing the explosive growth of unstructured data. It is isolated from other storage technologies and it keeps a unified global namespace to virtualize the disk and memory resources into a single shared pool that is centrally controlled…. Read more »


Ganglia, the scalable distributed monitoring system is meant for high-performance computing systems like Clusters and Grids. Based on a hierarchical design, Ganglia is targeted at federations of clusters. It leverages widely used technologies such as XML for data representations, XDR for compact, portable data transport, and RRD tool for data storage and visualizations. It uses… Read more »


The graphical front end is what makes VnStat different other monitoring tools available today. It is used to view and monitor bandwidth usage in network traffic. It uses a web based interface to establish connection and represent those findings in a nice graphical interface, which is developed using PHP. It is helpful for administrative activities… Read more »


    Let us begin with the origins of Mail Transfer Agent before setting foot on to further details. Philip Hazel came up with the script behind Exim in 1995, which was an improved version of the former MTA Smail. Exim gives a highly configurable environment, dual style, which includes access control list section, routers section, transports… Read more »

    Read More
    Posted on September 29, 2015 by
  • MapReduce for Faster Processing

      MapReduce is a technology introduced to process data at a faster rate. Managing a lot of data processors is a cumbersome task along with parallelization and distribution, input-output scheduling, status and monitoring, fault and crash tolerance. Map reducing eases the processes involved in all those tasks. Overview MapReduce is the key algorithm that is… Read more »

    Read More
    Posted on September 17, 2015 by
  • Linux and the Penguin

      The penguin mentioned here is not the awe-inspiring original species, but the one which is embodied as the Linux mascot Tux. What do you see when you look at him? “Just a penguin or is it a lovely, cuddly, stuffed penguin, sitting contended after engorging a wholesome meal of herring”, says Linus Benedict Torvalds,… Read more »

    Read More
    Posted on September 17, 2015 by
  • Are you worried with the free memory available in your Dedicated Server ? Here are some solutions…

    Most of us are aware of the command “free“ which is used to check the RAM usages in the server. First of all, let us familiarize about the output of that command. The image shown is a sample output of the command. In this example, the total amount of available memory is 12259156 KB. 3947084… Read more »

    Read More
    Posted on August 4, 2015 by
  • Vulnerability of WordPress

    In order to prevent attacks on the websites, it is essential that we need to be aware of the vulnerabilities associated with Content Management System (CMS) that we use. Among all the available Content Management System software, WordPress is the most easiest and popular blogging & website CMS available today, as it has features like… Read more »

    Read More
    Posted on July 30, 2015 by
  • When the world has access to Free Internet

    Internet, regarded as one of the greatest inventions of humankind, has expanded its reach to almost all sectors that we encounter in our day to day life. From interconnected LAN networks to WiFi and 4G the internet has made rapid strides when it comes to technological growth and also in terms of ease of access…. Read more »

    Read More
    Posted on July 22, 2015 by
  • Cold calls: An Overture to a Long Business Relationship

    Each one of us at some point of time might have experienced calls from a tele-caller representing some company and offers his/her assistance in choosing any of their services. More often these disgruntled calls end up in a verbal fight with the caller. In some cases, the caller can be so convincing so that the… Read more »

    Read More
    Posted on June 29, 2015 by
  • The Importance of Backup Solutions in Hosting

    Most customers prefer low cost hosting plans. In an attempt to fit the cost in the available budget, they often disregard important features like backup solutions. Ignoring the importance of backup solutions is the main reason why websites take a longer time to get back on track when encountered with troubles like data corruption or… Read more »

    Read More
    Posted on June 22, 2015 by
  • Mod­­­_Security

    Mod_Security is a web application firewall, which is a free software released under the Apache license 2.0. It helps in protecting websites from various attacks. The main advantage of the application lies in its user-friendliness, as the user can customise his path through the available features. This blog discusses different usage scenarios of the application… Read more »

    Read More
    Posted on May 22, 2015 by
  • An Introduction to Bitcoin: The Open Source Cryptographic Currency

    The modern world is flying high on the wings of technology. In the last two decades, we have witnessed several inventions, which have brought a sea change in the way things get executed. In a developing country like India, people are always looking for better alternatives and are willing to adapt new technologies. From barter… Read more »

    Read More
    Posted on May 8, 2015 by
  • Few Features of Proxy server

    Few years back, connecting to an internet was not at all an easy task. Now a plethora of players are competing to provide high speed internet. High speed internet can serve multiple purposes and needs. When we access too many websites, internet security is naturally a point that deserves attention. Proxy servers can be a… Read more »

    Read More
    Posted on May 4, 2015 by
  • Mail Transfer Agents

    Mail Transfer Agent (MTA) is a software application that routes electronic mail messages from the sender’s computer to the recipient’s, using an Internet message handling system (MHS). MTA adopts client-server architecture. The best examples of MTAs are Microsoft Exchange, UNIX Send mail, Webmail etc. A detailed explanation on Mail Transfer Agents along with its functions… Read more »

    Read More
    Posted on May 1, 2015 by