Xen Bridge Networking

Posted December 19, 2010 by admin

Xen provides couple of different networking options like bridge networking, nat networking and route networking. Bridging is a technique used for connecting different network segments. It is the default option for Xen networking as it simply connects all the virtual machines to the outside world through virtual network interfaces connected to the bridges created by Xen. When using bridged networking, Xen creates a network bridge and then connects the actual physical network interface to this bridge. Virtual network interfaces are then created for dom0 and each of the…

Read more...

Basics of iptables

Posted December 17, 2010 by hans

Iptables is the default firewall used in many present Linux distros. It is a project under netfilter. Previously it was known as ipchains (For 2.2 Kernels) , ipfwadm(for 2.0 kernels) and nftables are their future project..Iptables are designed for ipv4 and ipv6table for ipv6. From ipfwadm to iptables , we can see marginal modifications done in design and hence in features. In ipfwadm a rule set matched the packets and actions are taken on that packets , then in ipchains , chains are Incorporated and the rules will…

Read more...

Dynamic Web Scraping Using Selenium

Posted November 24, 2010 by Shameem Khalid

This article is a part of the on-going Web Scraping Series. If you are not familiar with Web Scraping please check with the first article . This session mainly deals with Dynamic Content Scraping. Nowadays most of the web portals are dynamic by making Ajax calls instead of old static web pages. Scraping on dynamic environment is both interesting and challenging one. The first part of the discussion concentrated mainly on static page scraping with Perl mechanize module. Even though mechanize provides extension for dynamic scraping, it is…

Read more...

VIRTUAL DESKTOP INFRASRTUCTURE

Posted November 3, 2010 by bijopg

VIRTUAL DESKTOP INFRASRTUCTURE (VDI) The idea behind what is called a Virtual Desktop In­frastructure (VDI) is to run desktop operating systems and applications inside virtual machines that reside on servers in the data center. Desktop operating sys­tems inside virtual machines are also referred to as virtual desktops. Users access the virtual desktops and applications from a desktop PC client or thin client and get almost the full features as if the applications were loaded on their local systems, with the difference being that the applications are centrally managed.…

Read more...

Git access control with Gitosis

Posted October 27, 2010 by hans

There are many open source version control systems like Bazaar, Arch, Aegis, SVN ,CVS , Git etc. All systems have there own pros and cons. But I personally like Git due to it's flexibility and possibilities.It have an excellent network compatibility. We can use the native Git protocol, but it also works over rsync, ssh, HTTP and HTTPS. Access control is the more painful headache for admins. ie who can commit , who can access projects etc. Here we can manage git repositories with gitosis , which is…

Read more...

Port based routing in Linux.

Posted October 2, 2010 by hans

By default, routing is based on destination IP address, i.e., the routing table will decide where to route the packet depending on the destination address field in the packet. But there are a number of other utilities and options on routing in linux. One interesting fact is that most of the routers are using linux kernel for their IOS (inter operating system). Isn't that cool? Now you can use your linux machine as your local router with more confidence, right? Other than destination IP address we can also…

Read more...

Nasscom IMS 2010: We are Attending

Posted September 9, 2010 by admin

Nasscom Infrastructure Management Summit 2010, will be held in Bangalore on September 15 and 16 and we will be attending. With the Indian market shifting its focus to cloud computing and RIM services, NASSCOM IMS 2010 will be a platform for discussion about the emerging technologies and where the industry is heading. Event details on the NASSCOM IMS 2010

Read more...

We are hiring Web Designers with excellent coding skills

Posted September 2, 2010 by Nisha Ajil

Web Designers: We are looking for well experienced candidates with excellent skills in web designing and technology. Web Designer requirements: Up to 1-3 years of experience in Web Designing. Candidates should be familiar with XHTML, CSS and understand basic Javascript/ JQuery. Eligibility Criteria : Btech/BE ( CS ,EC,IT,EEE) /  MCA with consistent academic records. 1 - 3 yrs of work experience in relevant field. XHTML, CSS Understand basic Javascript / JQuery. Search engine friendly websites and web standards basic knowledge Adobe photoshop, Illustrator , Adobe Flash knowledge and…

Read more...

We are hiring Btech/BE Freshers ( CS , ECE , IT , EEE )for our Perl &a...

Posted by Nisha Ajil

Description: We are looking for  BE/Btech freshers from IT, CSE ,EEE, EC branches who has excellent programming skills. Proactive candidates with exceptional coding skills. The candidate must be capable of quickly learning new technologies and capable of working on applications deployed in distributed environment. Basic knowledge of Linux platform , Perl, PHP  will be a plus. Eligibility Criteria: BTech/ BE - CSE, ECE , IT, EEE( 60%above final results and should not have any back papers ) Excellent programming skills ( C, C++) .Basic knowledge of PHP/ Perl…

Read more...

Transparent Data Encryption In SQL Server 2008

Posted August 2, 2010 by bijopg

As a Database or System Administrator, security is one of the most important areas to consider when it comes to protecting the databases that you support. We use various mechanisms and technologies to secure our data and databases such as firewalls, certificates, and data encryption. Having said that although we have secured our environment, questions will always be raised regarding database security. Although we have protected our databases, what would happen if someone steals the mdf file or if someone steals the backup file. Although there are few ways…

Read more...

← Newer posts Older posts →