Quantcast
Browsing all 30 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Facebook chat codes

Facebook chat is now a daily life routine.People used to chat online with their freinds for hours on facebook, even working employee used to chat in their free time and even some people are found...

View Article


Image may be NSFW.
Clik here to view.

df command in linux

df(Disk Filesystem) Provides Disk space usage of our File System.df is a command line utility mostly used for checking disk space utilization in Linux. Now Let us see what happen when we type df on...

View Article


Image may be NSFW.
Clik here to view.

soft links and hard links in linux

This tutorial is all about how to create  and manage Soft links and Hard links to files in your linux system.Names for files are stored on disk in directories.Only the names of Files are stored in...

View Article

Image may be NSFW.
Clik here to view.

HTTP(Hypertext Transfer Protocol) Request and Response

In this article we will be discussing the foundational protocol of the internet. During 1990 Tim Berners-Lee, was the first one to propose a project called world wide web. The original purpose was to...

View Article

Image may be NSFW.
Clik here to view.

SLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention

A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today. Such a kind of attack is very difficult to mitigate, especially for small...

View Article


Image may be NSFW.
Clik here to view.

Linux kernel rp_filter settings (Reverse path filtering )

The main functionality of a router is to route packets from one place to another. Linux machine can be used as router on your network that will route substantial amount of traffic without any issues,...

View Article

Image may be NSFW.
Clik here to view.

Microsoft SQLIO: Disk performance test and benchmark tool

Database is a critical and on demand resource in any IT infrastructure. Database administrators and developers deploy mission critical databases for different applications. However the underlying disk...

View Article

Image may be NSFW.
Clik here to view.

Linux access control using TCP WRAPPERS

Maintaining a good access control list is a nice practice, that must be adopted by any Linux system administrator.This can be achieved with the help of multiple tools. An additional layer of security...

View Article


Image may be NSFW.
Clik here to view.

Linux iptraf and iftop: Monitor,Analyse Network Traffic and Bandwidth

Analyzing and monitoring network traffic of an entire network infrastructure can be done by plotting graphs based on any RRD tool. However monitoring traffic (both outgoing and incoming) on a Linux...

View Article


Image may be NSFW.
Clik here to view.

RAID Levels: RAID 0,RAID1,RAID 10,RAID 5,RAID 6(Complete Tutorial)

Hard Disk drives are one of the most complex devices that are attached to a computer system(or a server machine). The complexity of a hard disk is due to the fact that it is a mechanical device, used...

View Article
Browsing all 30 articles
Browse latest View live