Ransom:Win32/Petya.A-joey / Ransom:Win32/Petya Alert level: Severe Ransomware? WannaCry? Petya? What are these words? No dictionary mentions them or there wasn’t any bubble about them till last year, yet nowadays they tend to be the most powerful searched & feared terms! Searched by novices & Feared by the unfortunate affected victims! Starting the second week of… Read More »
Demonetization! Breaking the grip of Corruption, Terrorism & Black Money.. really? Demonetization! Demonetization!! Demonetization!!! All news channels flooded up since 2nd week of November 2016! What is this Demonetization?? The recent announcement of 500 & 1000 rupees currency notes demonetization put everyone in our country in the life-size test due to the brutal suppression of… Read More »
According to Morgan Stanley survey, the year 2017 consecrate the true start of connected objects to the mass market. Today, if your fridge is still not connected to the Internet to automatically renew buying milk when the last bottle has been emptied, it will not be long. That’s at least is the vision, schematic course… Read More »
The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions. The Internet of Things connected all of… Read More »
In a previous article we have seen the basic mechanisms that are used while configuring load balancing (Load Balancing with HAProxy for High-Availability), so let’s get into the types of load balancing… No Load Balancing The name says it all; without load balancing it’s just a simple web application environment. The following diagram will help… Read More »
HAProxy is primarily famous for a HTTP and TCP load balancing, but the possibilities offered by this application make is like a “Swiss Army Knife” to deal with high loads on web/databases. Let’s dig deeper in this subject…
Data is transported over a network by three simple methods i.e. Unicast, Broadcast, and Multicast. So let’s begin to summarize the difference between these three…
Today we are going to see the right information and theoretical steps that will help you to choose a proper RAID system according to the requirements.
When you compare cloud feature from different providers you see distinct feature names, you discover almost everyone provide same features but in different distinct manner. This leads to confusion. Let’s see how to overcome from this confusion.
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If… Read More »