Difference between SAN and NAS

Network Attached Storage (NAS) has been used to refer to file storage over a protocol like NFS (Network File System) or SMB (Microsoft’s file sharing protocol). These protocols know about things like directory structure and files.

Read more

Cheap Linux VPS hosting In India

VPS stands for Virtual Private Server, in this type of web hosting we create separate virtual servers by Virtualization technology such.
Read more

Linux Malware Detect (LMD)

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 (free, open source) license, this is designed around the threats faced in shared hosted environments.
Read more

What is DD Command ?

DD is a command-line utility for Unix and Unix-like operating systems where the primary purpose is to copy a file and converting the format of the data during the process.

Read more

Domain Name ?

In short, It is your website name. Which address where Internet users can access your website.

Read more

HTML ?

HTML is a language to create an application or website. It is the short form of Hypertext markup language.

Read more

How to protect our computer from viruses ?

1. Keep your computer updated

When Microsoft and Apple release updates for our computer, they include security updates to keep up with the latest viruses and hacking tools. A simple process like accepting an update on our computer can actually make it less susceptible to both viruses and hackers.

Read more

How to protect our mobile phones from viruses ?

1. Beware of fake download buttons

These can turn up anywhere, but generally we’ll find them on download sites. We can guarantee there will be a download button that isn’t the one you want to click. The result can be that you downloaded something you don’t want possibly malware, although often simply bad software.

Read more

How to select the best CMS for our hosted website

1. HOSTING REQUIREMENTS

Our website hosting environment can introduce specific requirements or limitations into the selection process. For example, we may only be able to host within a LAMP stack environment which requires a PHP based CMS, while some organizations are only able or willing to host in a Microsoft-based IIS environment, which would prefer a .NET based CMS solution.

Read more

Unified Thread Management (UTM)

What is UTM ??

Unified threat management (UTM) is a solution in the network security industry, and since 2004 it has gained currency as a primary network gateway defense solution for organizations.

Read more

3 Most easy-to-use tools that can encrypt our data on linux

1. GNU Privacy Guard

GNU Privacy Guard (GnuPG) is actually an open-source implementation of Pretty Good Privacy(PGP). While we can install the command line version on some operating systems, most people choose from the dozens of frontends and grafphical interfaces for it, including the official releases that can encrypt everything from email to ordinary files to entire volumes.
Read more