All about Cloud Computing

download (9)

Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user’s data, software […]

How to monitor power usage in Linux

images (16)

Saving power is one of the major concerns of the modern world. You see cities observing Earth Hours, studies showing how computers consume excess power when kept running and so on. Even if you would view it from your personal perspective, saving power can make your laptop batteries last longer and provide longer battery backup. […]

Why opt for outsourcing your project?

outsource_finger

IT outsourcing is nowadays viewed as a kind of remedy able to help in any situation and pull virtually any project to the imminent success. For that reason more and more companies plan to save on their own IT department and turn to those who are claimed IT professionals — IT outsourcing companies.  The path […]

Credit Card Fraud Screening

ecommerce-fraud

Credit card fraud screening is a service offered by various organizations to assist merchants in preventing credit card fraud. The overarching aim is to make sure each credit card transaction is legitimate. Payment gateway providers may have screening features. If they do, you may need to make sure they are on, because they are reportedly […]

IT disaster recovery plan

images

Businesses should develop an IT disaster recovery plan. It begins by compiling an inventory of hardware (e.g. servers, desktops, laptops and wireless devices), software applications and data. The plan should include a strategy to ensure that all critical information is backed up. Identify critical software applications and data and the hardware required to run them. […]

Steps to reduce spam

spam

The steps you can follow to minimize the amount of spam you receive to your inbox: 1.You can discard mails to users mailbox that don’t exist i.e.., disable catch-all. You can find the option in your Cpanel->Mail->Default Address. In the to: field – enter: :fail: no such address here 2.Filter your emails. You can find […]

25 Most Frequently Used Linux IPTables Rules

Hungary Ericsson Lab

1. Delete Existing Rules Before you start building new set of rules, you might want to clean-up all the default rules, and existing rules. iptables -F (or) iptables –flush 2. Set Default Chain Policies The default chain policy is ACCEPT. Change this to DROP for all INPUT, FORWARD, and OUTPUT chains iptables -P INPUT DROP […]

Email Spoofing

images (14)

Have you ever gotten an email that appeared to be from a friend or colleague (or even worse, from yourself) but the subject and text were obviously not something that he or she would send? Or have you ever gotten an undeliverable email notice for an email that you never sent out? Both of these […]

Qmail – An introduction

download (3)

Qmail is a mail transfer agent (MTA) for Unix like operating systems. When I say MTA, naturally the question comes – what is an MTA? For that, first we need to know how internet email works. Suppose Robert wants to send a mail to Ann. He opens his email client, enters the from field, types […]

Pages:12»