An Introduction to Bitcoin: The Open Source Cryptographic Currency
The modern world is flying high on the wings of technology. In the last two decades, we have witnessed several inventions, which have brought a sea change in the way…
The modern world is flying high on the wings of technology. In the last two decades, we have witnessed several inventions, which have brought a sea change in the way…
Few years back, connecting to an internet was not at all an easy task. Now a plethora of players are competing to provide high speed internet. High speed internet can…
Mail Transfer Agent (MTA) is a software application that routes electronic mail messages from the sender’s computer to the recipient’s, using an Internet message handling system (MHS). MTA adopts client-server…
The Virtual Desktop Infrastructure (VDI) is one of the most popular technologies among corporates and educational institutions. This is a server-centric computing model that borrows from the traditional thin-client model,…
The modern technological world can easily assist innovative minds to explore new horizons. “World at your fingertips’ is perhaps an apt way to put it candidly. When it comes to…
Earlier, IT companies used to endure high initial costs to run operating systems. Even though pirated versions were available, the original versions were absolutely necessary as it was illegal to use pirated versions. Majority of the companies relied on Microsoft Windows as their operating systems and essential IT products like MS Office, SQL database etc. were too expensive. Unfortunately, then the companies didn’t enjoy many alternatives. (more…)
BYOD brings with it a revolutionary transformation of end-user workspaces. It unshackles practices like employees tied to a physical location and specifications like rigidly configured devices, OS, applications and user states. It simply allows users to work from anywhere, accessing applications and content using myriad device configurations. In short, the benefits offered by BYOD make it worth pursuing. But to support the myriad devices, configurations and applications, organizations need to have a robust and scalable infrastructure. Above all, it requires specialized IT expertise to manage this news environment and infrastructure. (more…)
Multi-tasking ability and faster response time are the most attractive features of Linux machines. Still some tasks may overburden the CPU and contribute to sluggish performance of machines. From running MySQL process to back up, the CPU is getting utilised in full. It is fine, if the machine is not engaged in any other processes or tasks. But what if the machine functions as a server or your main desktop? In this case, overburdening CPU for running a task will definitely result in slothful performance. (more…)
In real time environment, optimising the performance of the servers holds the key. In order to enhance the performance of the servers it is important to know related information about the system like CPU utilization, memory usage, network, disk I/O etc. In other words, it is essential to monitor these factors 24 x 7. High load surge and server downtimes are unavoidable and monitoring tools provide alerts in such critical situations. Some important monitoring tools are mentioned below. (more…)
Secured Socket Layer, more commonly called as SSL, is a protocol in which data is transferred in an encrypted format to ensure security. This data transfer between client and the server is established with the help of certificates. SSL certificate is an absolute necessity for e-commerce sites as end users need to submit critical information like credit card details and personal information. Once installed, then the sites are accessed using the IP address header https:// rather than http://. Even though SSL ensures security they have some inherent vulnerability. This article mentions about SSL principles and its vulnerability.
(more…)
As Linux servers are handled using commands, the following points should be taken note of while executing certain commands that could be potentially destructive. These commands should be used only…
Millions of websites are being hacked every day at different corners of the globe. Another million websites are prone to be a victim of this unfair phenomenon. A callous approach in maintaining the servers is the chief reason for hacking. The following are some ways by which hacking can be controlled to a great extent. (more…)