What is NotPetya? The primary side effects of the attack showed up on June 27 in Ukraine, with the National Bank of Ukraine and the Kiev International Airport both got hit hard. Indeed, even Chernobyl’s radiation monitoring system has apparently been influenced. In any case, NotPetya, which focuses on the Windows systems, didn’t remain there.… Read More »
Security – A term which was not so popular a decade ago. Security was earlier in terms of financial safety and home safety. Now, this term plays a huge role in the Information Technology sector and gaining widespread importance. Security tops the priority list of almost all CIOs. Data breaches and Cyberattacks concern top… Read More »
As Apache and Tomcat have high importance in web server hosting industry. There are both good and bad side this integration of Apache with Tomcat and there are different opinion about the same. Following are some points I would like to attach the discussion. Clustering – When Apache is used as front-end it works as… Read More »
There is always a confusion in the web site owners, Which Hosting option to choose? . Though the best Dedicated Server hosting is considered as best, VPS hosting has a number of similar advantageous and it can satisfy the clients needs. VPS: Virtual private Server, it a technique where the physical server is partitioned into… Read More »
A firewall is software written for the purpose of securing your computer from the threats like hacking, Viruses and worms that try to enter your system from the network. Using firewall is the first step to make your system secured. It is the device or set of devices which is configured to either permit or… Read More »
After the great success of the Google chrome browser, Google is now spreading wings to the master software i.e Operating system named after the browser itself as Google chrome OS. Stats show that over 30 million people use Chrome browser every day. The concept behind developing such kind of operating system is that, OS were… Read More »
Tunneling Overview! Tunneling is the basis of VPN . Almost all the VPN works on the method called tunneling.Tunneling is the method of used to transfer data from one network over another network in Network Infrastructure. The data to be transferred can be in frames of another protocol. Tunneling encapsulates the data send by the… Read More »
This blog is protected by Dave's Spam Karma 2: 55584 Spams eaten and counting...