Everything you need to know about the iPhone 6 and iPhone 6 Plus
Following months of rumors and speculation, Apple took the wraps off its highly-anticipated iPhone 6 and iPhone 6 Plus at its product event on Tuesday afternoon. Advertised as “bigger than bigger,” the...
View ArticleHow to update Jailbroken iPhone or iPad to iOS 8
If you’ve a jailbroken iPhone, iPad or iPod touch, and trying to update it to iOS 8 using OTA update, then you are probably seeing the “Checking for Update” screen as you can see above. The issue is...
View ArticleHow to downgrade from iOS 8 to iOS 7.1.2
If you had accidentally upgraded your iPhone, iPad or iPod touch to iOS 8 or don’t like it or are finding performance issues on older iOS devices and want to downgrade back to iOS 7.1.2, then the good...
View ArticleHow to fix iOS 8 battery life problems
The problem with iPhone, iPAD battery life issues is that it is very subjective as it is based on your usage pattern, so it is difficult to pin point what exactly is causing a problem. Check out these...
View ArticleHow to Protect your Server Against the Shellshock Bash Vulnerability
On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the "Bash Bug", was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain...
View ArticleBuilding and Deploying Nagios on Oracle Solaris 11
Nagios is a popular open source system, network, and infrastructure monitoring application. Nagios offers monitoring and alerting services for servers, switches, applications, and services. This...
View ArticleHow to Create an Automated Installer Manifest Using a New Interactive Wizard...
The Oracle Solaris 11 Automated Installer provides administrators with a secure, automated, network-based, hands-off method for installing client systems in the data center. Having a fast deployment...
View ArticleHow To Configure Sensu Monitoring, RabbitMQ, and Redis on Ubuntu 14.04
Sensu is a monitoring tool written in Ruby that uses RabbitMQ as a message broker and Redis for storing data. It is well-suited for monitoring cloud environments.Sensu connects the output from "check"...
View ArticlevCloud Automation Center (vCAC 6.0) Installation Part 1 – Overview of vCAC
In this Modern Enterprise environment, Datacenters are occupied by hardware and software components from multiple vendors. Even some companies have hardware from multiple vendors like HP, DELL,Cisco...
View ArticlevCloud Automation Center (vCAC 6.0) Installation Part 2 – Components of vCAC
vCloud Automation Center vCAC 6.0 required 3 important components. We should install and configure the below 3 components and its sub components properly to make use of vCAC website to provision and...
View ArticlevCloud Automation Center (vCAC 6.0) Installation Part 3 – Deploy VMware...
First Step before deploying vCloud automation Center vCAC (6.0) is deploying VMware Identity Appliance.VMware Identity Appliance provides single sign-on (SSO) for vCloud Automation Center. Multiple...
View ArticleHow To Measure MySQL Query Performance with mysqlslap
MySQL comes with a handy little diagnostic tool called mysqlslap that's been around since version 5.1.4. It's a benchmarking tool that can help DBAs and developers load test their database servers....
View ArticleHow To Set Up a Mirror Director with MirrorBrain on Ubuntu 14.04
Mirroring is a way of scaling a download site, so the download load can be spread across many servers in many parts of the world. Mirrors host copies of the files and are managed by a mirror director....
View ArticleVCE Exam Simulator 1.1.6 - Download
A desktop exam engine for certification exam preparation. Create, edit and take exams that are just like the real thing. VCE Exam Simulator - What's Newv1.1.6 (Oct 9, 2014)Stability:Fixed: Small...
View ArticleHow to Identify Network Vilification with Wireshark
Whether you’re looking for peer-to-peer traffic on your network or just want to see what websites a specific IP address is accessing, Wireshark can work for you.Identifying Peer-to-Peer...
View ArticleHow To Protect your Server Against the POODLE SSLv3 Vulnerability
On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed. This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker...
View ArticleSSH Essentials: Working with SSH Servers, Clients, and Keys
SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in...
View ArticleHow To Configure SSH Key-Based Authentication on a Linux Server
SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Linux server, chances are, you will spend most of your time in a terminal session...
View ArticleHow to Enable Guided Access On Your iPad or iPhone For Kids
iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive...
View ArticleHow To Create a Puppet Module To Automate WordPress Installation on Ubuntu 14.04
Puppet is a configuration management tool that system administrators use to automate the processes involved in maintaining a company's IT infrastructure. Writing individual Puppet manifest files is...
View Article