Mod­­­_Security

  • Post author:

Mod_Security is a web application firewall, which is a free software released under the Apache license 2.0. It helps in protecting websites from various attacks. The main advantage of the…

Continue Reading Mod­­­_Security

Few Features of Proxy server

  • Post author:

Few years back, connecting to an internet was not at all an easy task. Now a plethora of players are competing to provide high speed internet. High speed internet can…

Continue Reading Few Features of Proxy server

Mail Transfer Agents

  • Post author:

Mail Transfer Agent (MTA) is a software application that routes electronic mail messages from the sender’s computer to the recipient’s, using an Internet message handling system (MHS). MTA adopts client-server…

Continue Reading Mail Transfer Agents

Virtual Desktop Infrastructure

  • Post author:

The Virtual Desktop Infrastructure (VDI) is one of the most popular technologies among corporates and educational institutions. This is a server-centric computing model that borrows from the traditional thin-client model,…

Continue Reading Virtual Desktop Infrastructure

The rise of M-Commerce

  • Post author:

The modern technological world can easily assist innovative minds to explore new horizons. “World at your fingertips’ is perhaps an apt way to put it candidly. When it comes to…

Continue Reading The rise of M-Commerce

Startup Companies focus on Open Source Techniques

  • Post author:

STartup

Earlier, IT companies used to endure high initial costs to run operating systems. Even though pirated versions were available, the original versions were absolutely necessary as it was illegal to use pirated versions. Majority of the companies relied on Microsoft Windows as their operating systems and essential IT products like MS Office, SQL database etc. were too expensive. Unfortunately, then the companies didn’t enjoy many alternatives. (more…)

Continue Reading Startup Companies focus on Open Source Techniques

Securing the enterprise workspace with BYOD

  • Post author:

Print

BYOD brings with it a revolutionary transformation of end-user workspaces. It unshackles practices like employees tied to a physical location and specifications like rigidly configured devices, OS, applications and user states. It simply allows users to work from anywhere, accessing applications and content using myriad device configurations. In short, the benefits offered by BYOD make it worth pursuing. But to support the myriad devices, configurations and applications, organizations need to have a robust and scalable infrastructure. Above all, it requires specialized IT expertise to manage this news environment and infrastructure. (more…)

Continue Reading Securing the enterprise workspace with BYOD

How to limit the CPU usage by a Linux process ?

  • Post author:

CPU2

Multi-tasking ability and faster response time are the most attractive features of Linux machines. Still some tasks may overburden the CPU and contribute to sluggish performance of machines. From running MySQL process to back up, the CPU is getting utilised in full. It is fine, if the machine is not engaged in any other processes or tasks. But what if the machine functions as a server or your main desktop? In this case, overburdening CPU for running a task will definitely result in slothful performance. (more…)

Continue Reading How to limit the CPU usage by a Linux process ?

Server Monitoring Tools

  • Post author:

servermonitor

In real time environment, optimising the performance of the servers holds the key. In order to enhance the performance of the servers it is important to know related information about the system like CPU utilization, memory usage, network, disk I/O etc. In other words, it is essential to monitor these factors 24 x 7. High load surge and server downtimes are unavoidable and monitoring tools provide alerts in such critical situations. Some important monitoring tools are mentioned below. (more…)

Continue Reading Server Monitoring Tools

Secured Socket Layer (SSL) and related Vulnerabilities

  • Post author:

ssl_certificate_003_400_x_400

Secured Socket Layer, more commonly called as SSL, is a protocol in which data is transferred in an encrypted format to ensure security. This data transfer between client and the server is established with the help of certificates. SSL certificate is an absolute necessity for e-commerce sites as end users need to submit critical information like credit card details and personal information. Once installed, then the sites are accessed using the IP address header https:// rather than http://. Even though SSL ensures security they have some inherent vulnerability. This article mentions about SSL principles and its vulnerability.
(more…)

Continue Reading Secured Socket Layer (SSL) and related Vulnerabilities

Dangerous commands on Linux

  • Post author:

As Linux servers are handled using commands, the following points should be taken note of while executing certain commands that could be potentially destructive. These commands should be used only…

Continue Reading Dangerous commands on Linux