Command and Control Server are centralized servers which are able to send commands and a part of Botnet. Botnet is group of computers to run automated program. The bots (came from the English words - "robots") can run on the networked computers whose network connections are available as well as on local resources and collect the available data. So, as can be understood, Command and Control Server … [Read more...]
Sandbox in Computer Security
Sandbox allows the execution of software(s) with less risk to the operating system. These are often used to execute untested code of dubious origin. We talked about Advanced Persistent Threats or APT in an older article, also we mentioned we use Sandbox mode to check them. The term Sandbox is also used in a broader sense to refer to a test environment for software or websites - we are not talking … [Read more...]
How to Analyze Network Traffic to Detect Advanced Persistent Threats
Many IT workers feel more like firemen than like networking professionals. They detect network attacks, respond to them and move on to the next problem. However, putting out fires is an ineffective approach because research has shown that most cyber attacks are not one-time events. They are a series of ongoing attacks designed to probe a network's weakness and compromise it. While knowing that … [Read more...]
LaTeX – Details and Softwares for using LaTeX
LaTeX is a typesetting system for document preparation and works as document markup language. LaTeX uses the TeX typesetting program for formatting the output. Previously we wrote about Markdown Syntax, LaTeX is geared especially towards the creation of books, scientific and technical documents containing mathematical formulas. LaTeX is pronounced like Lahtekh. T, E, X in the name are capital … [Read more...]
Business Intelligence Software in Healthcare
Increased desire for more and better information by different industries resulted in increased sales of Business Intelligence solutions including Healthcare. In a given size of the company, which mainly composed by the number of employees, a company-wide usage of business intelligence software should follow a comparison of several leading Business Intelligence software solutions for relevant … [Read more...]
Tips for using Virtualization Tools
Tips for using Virtualization Tools evaluates Virtualization on desktop operating system only. We have tested and published video guides on virtualization tools before that works either for the desktop or server. As the time changes, some becomes either better or worser. Additionally, we have added some tips which were not present before. The sole reason for an new article on the topic Tips for … [Read more...]
Base64 Encoding and Font CSS
Base64 Encoding Data URI can be used for Font Face in CSS Files, this is basically a good practice as we are decreasing four HTTP requests per font face. Redmond's Browser (read Internet Explorer, if you never heard the terminology) can not be taken as a standard web browser, unfortunately. More unfortunately, it is still used and we still need to add the CSS, Javascript etc. fix for each … [Read more...]
Google App Engine and PHP : Beginners Guide
Google App Engine now supports PHP. There is separate Plugin for WordPress. Support for phpMyAdmin and all PHP-MySQL web softwares and frameworks is available. This is not a to do guide for Google App Engine - this is a brief up with link towards all the needed resources. That simply means - who has very less idea about PaaS model, can start from here. Google App Engine and PHP : … [Read more...]
Advanced Optimization of Rackspace Cloud Server for WordPress
Advanced Optimization of Rackspace Cloud Server for WordPress includes installation of Memcached, PEC, APC, XCache, eAccelerator and installation of New Relic. You must be already running a Server instance with rpm based REHL (Red Hat/CentOS, commands might differ for others) distro variants with already installed and up WordPress from our older video guides (please search in this website, if … [Read more...]
WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin
WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin with perfect configuration demands quite good idea on many aspects,here are some for you. Our older guide on W3 Total Cache was officially suggested by the Plugin Developer Frederick Townes on WordPress Official Repository for optimizing WordPress, you can see the reference as text file here. We wrote many articles on .htaccess … [Read more...]
Data Security in 10 Steps
Data Security in 15 Steps describes to ensure protection of company or individual's data, which one must re-adjust while handling digital information on Cloud. We write more about the security and privacy part, because mere reading or following the video instructions, video tutorials can never provide security of data. Data Security increasingly gaining more corporate value. This increases the … [Read more...]