Blog

iPhone hidden features

iPhone hidden features

Here’s are iPhone hidden features which you didn't even know existed The iPhone is a multimedia enabled smart phone designed, manufactured and marketed by Apple Inc. The first of its kind was introduced in early 2007 and since then it has gained great popularity among its users. The smartphone has a variety of complex and advanced functionalities and its use has always left the users delighted. It can function as a camera phone, portable media player, visual voicemail and can be used for text messaging. The device has been used on several occasions as an internet client in web browsing,…
Read More
Reasons to Stick with MySQL

Reasons to Stick with MySQL

MySQL’s founder is encouraging people to steer away from his creation. Here’s why he’s wrong. Schism between the worlds of open source and proprietary software is never going to go away as long as open source remains viable and competitive. Eventually, you have a meeting of both worlds. In the case of MySQL, it was when Sun Microsystems purchased the open source database for $1 billion in 2008, a significant multiple given MySQL was about a $50 million business at the time. MySQL was the cause of the significant hang-up when Oracle tried to acquire Sun in 2009, as MySQL…
Read More
MySQL Update – MySQL Upgrade

MySQL Update – MySQL Upgrade

MySQL update process some times create issues like, MySQL server doesn't start. when you perform MySQL update using yum update or yum update mysql or yum update mysql-server before restarting or stopping server  , you need to run command mysql_upgrade or mysql_upgrade -uroot -p MySQL Update Errors some time mysql server stop and doesn't start and you are unable to perform mysql_upgrade command, you get error like this in mysql logs  /var/log/mysqld.log [ERROR] Can't open the mysql.plugin table. Please run mysql_upgrade to create it. Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' [ERROR] Fatal error: mysql.user table is damaged.…
Read More
Top Websites To Learn Ethical Hacking – 2016

Top Websites To Learn Ethical Hacking – 2016

Everybody wants to learn hacking in today’s age. However, this is not an easy task until you have basic knowledge about computers and network security. For beginners to know, there are two types of Hacking Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal. We provide you with a list of websites that offers you white hat content. However, it is important to note that as a beginner to not perform any hacking & cracking tactics that breach any cyber law. Hackaday Hackaday is one of the top ranked…
Read More

CyberSecurity Tips for Small Businesses

Cybersecurity Tips for Small Businesses Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats. Here are ten key cybersecurity tips for businesses to protect themselves: 1. Train employees in security principles Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and…
Read More

Cisco UCS Networking

Cisco UCS Networking, Physical network architecture [vsw id="4ohGQUraFjE" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Infrasctructure Virtualization [vsw id="ZL1V14kNBB8" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Switching modes of the Fabric Interconnect [vsw id="kQ5Bu-Xx1s4" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Upstream connectivity for SAN [vsw id="bindGcat5N8" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Appliance Ports and NAS direct attach [vsw id="TNNiYTcvw8I" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Fabric Failover with Hyper-V and bare metal OS [vsw id="OTp2HJaK09k" source="youtube" width="425" height="344" autoplay="no"]   Cisco UCS Networking, Fabric Failover with VMware [vsw id="DmcjPJbdqOg" source="youtube" width="425"…
Read More
Why did Google choose Java as programming language for Android

Why did Google choose Java as programming language for Android

Here are a few reasons why Google chose Java for its Android operating system Google hit a bullseye with smartphone users when it brought out the first version Android operating system. At that time when Nokia and its proprietary Symbian operating system, ruled the roost in smartphone market, Google brought out the first version of Android in 2007. Today Android smartphones rule the world with over 85 percent of the smartphones in the world running on various versions of Android operating system. Android’s source code is released by Google under open source licenses, although most Android devices ultimately ship with…
Read More
Tripfez – an online travel agency catering to Muslims

Tripfez – an online travel agency catering to Muslims

Tripfez scores funding to focus on Muslim holidaymakers Tripfez, an online travel agency catering to Muslims, today announced it has raised US$750,000 in seed funding. China’s Gobi Partners and Malaysia’s Intres Capital led the round, while Douglas Khoo, co-founder of Chinese travel booking site Qunar, put in some cash. Tripfez, based in Malaysia, was set up in 2013 by co-founders Faeez Fadhlillah and Juergen Gallistl – two former schoolmates brought together by their mutual love of travel. In a nutshell, the company helps Muslim travelers discover, compare, and book hotels and tour services that fit their specific needs. The hotel…
Read More
Salty coffee – A Heart Touching Story

Salty coffee – A Heart Touching Story

He met her at a party. She was so outstanding, many guys chasing after her, while he was so normal, nobody paid attention to him. At the end of the party, he invited her to have coffee with him, she was surprised but being polite, she promised. They sat in a nice coffee shop, he was too nervous to say anything, she felt uncomfortable, and she thought to herself, “Please, let me go home…” Suddenly he asked the waiter, “Would you please give me some salt? I’d like to put it in my coffee.” Everybody stared at him, so strange!…
Read More
KVM Installation on CentOS 6

KVM Installation on CentOS 6

KVM and CentOS 6 CentOS 6 has native availability of KVM virtualization support and tools in the base distribution.  See the meta packages contained in: # yum grouplist | grep -i virt 1. Host Setup Install all the packages you might need. yum -y install @virt* dejavu-lgc-* xorg-x11-xauth tigervnc \ libguestfs-tools policycoreutils-python bridge-utils If you have use any directories other than /var/lib/libvirt for kvm files, set the selinux context. In this example I use /vm to store my disk image files. semanage fcontext -a -t virt_image_t "/vm(/.*)?"; restorecon -R /vm Allow packet forwarding between interfaces. sed -i 's/^\(net.ipv4.ip_forward =\).*/\1 1/'…
Read More