Dec 12, 2014

Calibre is a free and open source ebook manager.

Although Calibre is probably better known for its desktop client, it can also act as a powerful server, allowing you to access your ebooks from anywhere in the world (or share your collection with friends). Keeping your ebooks on a server is great, as you aren't reliant on having the same reading device with you whenever you want to read. And if you go traveling, you don't need to worry about taking your ebook collection with you!

How To Create a Calibre Ebook Server on Ubuntu 14.04

Dec 11, 2014

This article is intended to help a new or experienced Oracle Solaris administrator to quickly and easily configure an Oracle Solaris Kernel Zone in failover mode using the Oracle Solaris Cluster HA for Oracle Solaris Zones agent.

How to Configure a Failover Oracle Solaris Kernel Zone

Dec 10, 2014

One of the common tasks that you may do on a regular basis is installing Windows Server 2012 and you want to automate it as much as possible. Using similar tools to those used with Windows Server 2008 R2, you can create an autounattend.xml file that you inject into the Windows Server 2012 installation ISO for a hands-free install.

Windows Server 2012 Unattended Installation

Jailbreak tutorial for iOS8.0-8.1.2

Support device: iPhone 4s- 6Plus; iPad/iPad Air/2; iPad mini/mini2/mini3; iPod touch 5

How to Jailbreak iOS8.0-8.1.2

Dec 8, 2014

Nginx has become one of the most flexible and powerful web server solutions available. However, in terms of design, it is first and foremost a proxy server. This focus means that Nginx is very performant when working to handle requests with other servers.

Nginx can proxy requests using http, FastCGI, uwsgi, SCGI, or memcached. In this article, we will discuss FastCGI proxying, which is one of the most common proxying protocols.

Understanding and Implementing FastCGI Proxying in Nginx

Dec 5, 2014

SSH, or secure shell, is the most common way of connecting to Linux hosts for remote administration. Although the basics of connecting to a single host are often rather straight forward, this can become unwieldy and a much more complicated task when you begin working with a large number of remote systems.

How To Configure Custom Connection Options for your SSH Client

Dec 4, 2014

Froxlor is a server management control panel that can be used to manage multi-user or shared servers. It is an alternative to cPanel or Webmin that allows system administrators to manage customer contact information, as well as the domain names, email accounts, FTP accounts, support tickets, and webroots that are associated with them.

How To Install Froxlor Server Management Panel on Ubuntu 12.04

Dec 3, 2014

Virtual Cert Exam v1.2 Crack VCE Simulator Avanset download solution to open VCE Certification Exams

Virtual Cert Exam v1.2 Crack VCE Simulator Avanset

We're going to install and configure OpenVPN on a CentOS 7 server. We'll also discuss how to connect a client to the server on Windows, OS X, and Linux. OpenVPN is an open-source VPN application that lets you create and join a private network securely over the public Internet.

How To Setup and Configure an OpenVPN Server on CentOS 7

Dec 1, 2014

Google engineers have trained a machine learning algorithm to write picture captions using the same techniques it developed for language translation.

Translating one language into another has always been a difficult task. But in recent years, Google has transformed this process by developing machine translation algorithms that change the nature of cross cultural communications through Google Translate.

How Google "Translates" Pictures Into Words Using Vector Space Mathematics

Nov 17, 2014

Cloud hosting is a method of using online virtual servers that can be created, modified, and destroyed on demand. Cloud servers are allocated resources like CPU cores and memory by the physical server that it's hosted on and can be configured with a developer's choice of operating system and accompanying software. Cloud hosting can be used for hosting websites, sending and storing emails, and distributing web-based applications and other services.

An Introduction to Cloud Hosting

Apple Pay is shiny, new, and getting a lot of press. But Android users have had their own similar payment system for years: Google Wallet. Google Wallet isn’t limited to a small number of phones anymore. Goole Wallet usage is even increasing, which is no surprise. Mobile payments are getting more press and point-of-sale terminals that support contactless payments are popping up in more places.

Google Wallet vs. Apple Pay: What You Need to Know

Nov 14, 2014


Although mobile devices have more storage space than ever before it’s so easy to fill up; wouldn’t it be nice if you could just pop a flash drive right into your device and expand your storage on the fly? Read on as we show you how mount a flash drive on your Android device.

How to Mount a Flash Drive on Your Android Device

Nov 10, 2014

TLS, or "transport layer security", and its predecessor SSL, which stands for "secure sockets layer", are web protocols used to wrap normal traffic in a protected, encrypted wrapper. Using this technology, servers can send traffic safely between the server and the client without the concern that the messages will be intercepted and read by an outside party. The certificate system also assists users in verifying the identity of the sites that they are connecting with.

In this article, we will show you how to set up a self-signed SSL certificate for use with an Apache web server on a CentOS 7. A self-signed certificate will not validate the identity of your server, since it is not signed by a trusted certificate authorities, but it will allow you to encrypt communications between your server and your visitors.

How To Create an SSL Certificate on Apache for CentOS 7

Nov 5, 2014

The Apache web server is the most popular way of serving web content on the Internet. It serves more than half of all of the Internet's active websites, and is extremely powerful and flexible.

Apache breaks down its functionality and components into individual units that can be customized and configured independently. The basic unit that describes an individual site or domain is called a virtual host. Virtual hosts allow one server to host multiple domains or interfaces by using a matching system. This is relevant to anyone looking to host more than one site off of a single Server.

Each domain that is configured will direct the visitor to a specific directory holding that site's information, without ever indicating that the same server is also responsible for other sites. This scheme is expandable without any software limit, as long as your server can handle the traffic that all of the sites attract.

In this guide, we will walk through how to set up Apache virtual hosts on a CentOS 7 Server. During this process, you'll learn how to serve different content to different visitors depending on which domains they are requesting.

How To Set Up Apache Virtual Hosts on CentOS 7

Oct 30, 2014

Most businesses require several server types such as file servers, print servers, email servers, etc. Zentyal combines these services and more, as a complete small business server for Linux.

Zentyal servers are simple to use because of the Graphical User Interface (GUI). The GUI provides an easy and intuitive interface for use by novice and experienced administrators alike. Command-line administration is available, too. We'll be showing how to use both of these methods in this tutorial.

How To Install Zentyal on Ubuntu 14.04

Oct 27, 2014

Avanset VCE Exam Simulator Pro v1.1.7 is an advanced exam and preparation software for learners and instructors to create their own pieces of practice examinations on a PC. This virtual exam maker let you prepare yourself for any kind of exams through practicing whether it's a drive test, science test, literature test and so on. 

Download Avanset VCE Exam Simulator Pro 1.1.7 free and save time and energy testing your skills, so as human nowadays tend to learn from technology devices more than books, this way a person will never feel boring exam preparation.

Avanset VCE Exam Simulator Pro v1.1.7 + Crack


There’s a lot you can do with the Google Chromecast but did you know you can cast your screen from your Android phone or tablet to any Chromecast-equipped display? It’s easy, and we’re going to tell you how to do it. The Google Chromecast rocks. It’s cheap ($35), tiny, and there’s so much you can do with it. If that’s not enough to convince you, then we urge you to check out our Chromecast review!

We’ve told you already how to cast any video from your desktop or laptop to your Chromecast. In this article we will show you now how to cast your Android device’s (phone or tablet) screen to your TV. Before you can cast, you need to make sure your device is ready.

Play Your Android Games and Videos on the TV with Google Chromecast


Using Smartphones as daily drivers for calls, web browsing, taking pictures, using social media, and keeping in touch with friends and family. With the disparity of battery capacities on Android devices, Apps like “Greenfly” can maximize battery life throughout the day.

How to Optimize Your Android Phone’s Battery Life Using Greenify

Oct 24, 2014


Outputting your computer to your HDTV via HDMI works well. Unfortunately, your computer’s location depends upon the length of your cable. With Google Chromecast, however, you can literally mirror any browser tab or even your desktop, from anywhere, in just a few clicks.

The point when video card manufacturers started including HDMI outputs was a great moment. Similarly, when TV makers began adding VGA inputs, we had yet another great way to add a huge second (or third) display to our setups. The implications, beyond the logical I-can-project-my-computer-now train of thought were pretty apparent. If you wanted to use your TV now to play games from your computer, or watch movies on a big screen, you could now do so easily and cheaply.

Mirror Anything from Your Computer to Your TV Using Google Chromecast

Oct 23, 2014

VNC, or "Virtual Network Computing", is a connection system that allows you to use your keyboard and mouse to interact with a graphical desktop environment on a remote server. VNC makes managing files, software, and settings on a remote server easier for users who are not yet comfortable with working with the command line.

In this article, we will be setting up VNC on an Ubuntu 14.04 server and connecting to it securely through an SSH tunnel. The VNC server we will be using is TightVNC, a fast and lightweight remote control package. This choice will ensure that our VNC connection will be smooth and stable even on slower Internet connections.

How to Install and Configure VNC on Ubuntu 14.04

Oct 22, 2014

Download link of all versions of vSphere Client starting from vSphere Client v4.1 Update 1 to the latest release vSphere Client v5.5 Update 2. Just click on the vSphere Client Image in the below table to directly download the respective vSphere Client version.

Download link for All Versions of VMware vSphere Client

To everyone’s surprise, and as we reported first, the Pangu jailbreak for iOS 8 and iOS 8.1 was released earlier today courtesy of a mysterious team of Chinese jailbreak developers.

Some important points before you proceed:

How to Jailbreak iOS 8.1 – iOS 8 using Pangu

Puppet is a configuration management tool that system administrators use to automate the processes involved in maintaining a company's IT infrastructure. Writing individual Puppet manifest files is sufficient for automating simple tasks.

However, when you have an entire workflow to automate, it is ideal to create and use a Puppet module instead. A Puppet module is just a collection of manifests along with files that those manifests require, neatly bundled into a reusable and shareable package.

WordPress is a very popular blogging platform. As an administrator, you might find yourself installing WordPress and its dependencies (Apache, PHP, and MySQL) very often. This installation process is a good candidate for automation, and today we create a Puppet module that does just that.

How To Create a Puppet Module To Automate WordPress Installation on Ubuntu 14.04

Oct 21, 2014



iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.

These features are named Guided Access and Restrictions, respectively. Guided Access is ideal for temporarily handing your iPad or iPhone to a kid, while Restrictions are ideal for locking down a device your kids use all the time.

How to Enable Guided Access On Your iPad or iPhone For Kids

Oct 20, 2014

SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Linux server, chances are, you will spend most of your time in a terminal session connected to your server through SSH.

While there are a few different ways of logging into an SSH server, in this guide, we'll focus on setting up SSH keys. SSH keys provide an easy, yet extremely secure way of logging into your server. For this reason, this is the method we recommend for all users.

How To Configure SSH Key-Based Authentication on a Linux Server

Oct 16, 2014

SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the remote server and executed there.

In this cheat sheet-style article, we will cover some common ways of connecting with SSH to achieve your objectives. This can be used as a quick reference when you need to know how to do connect to or configure your server in different ways.

SSH Essentials: Working with SSH Servers, Clients, and Keys

Oct 15, 2014

On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed. This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker to read information encrypted with this version of the protocol in plain text using a man-in-the-middle attack.

Although SSLv3 is an older version of the protocol which is mainly obsolete, many pieces of software still fall back on SSLv3 if better encryption options are not available. More importantly, it is possible for an attacker to force SSLv3 connections if it is an available alternative for both participants attempting a connection.

The POODLE vulnerability affects any services or clients that make it possible to communicate using SSLv3. Because this is a flaw with the protocol design, and not an implementation issue, every piece of software that uses SSLv3 is vulnerable.

How To Protect your Server Against the POODLE SSLv3 Vulnerability

Oct 10, 2014

Whether you’re looking for peer-to-peer traffic on your network or just want to see what websites a specific IP address is accessing, Wireshark can work for you.

How to Identify Network Vilification with Wireshark

Oct 9, 2014

https://dl.dropboxusercontent.com/content_link/kxpVAfwy8ZVvlBnjmxiLVYnAo5UPcDAFT39FHjjR6HwdB6GhnfCSkyVw00yYdF63?dl=1

 

A desktop exam engine for certification exam preparation. Create, edit and take exams that are just like the real thing.

VCE Exam Simulator 1.1.6 - Download

Oct 7, 2014

Mirroring is a way of scaling a download site, so the download load can be spread across many servers in many parts of the world. Mirrors host copies of the files and are managed by a mirror director. A mirror director is the center of any mirror system. It is responsible for directing traffic to the closest appropriate mirror so users can download more quickly.

Mirroring is a unique system with its own advantages and disadvantages. Unlike a DNS based system, mirroring is more much more flexible. There is no need to wait for DNS or even to trust the mirroring server (the mirror director can scan the mirror to check its validity and completeness). This is one reason many open source projects use mirrors to harness the generosity of ISPs and server owners to take the load off the open source project's own servers for downloads.

How To Set Up a Mirror Director with MirrorBrain on Ubuntu 14.04

Oct 2, 2014

MySQL comes with a handy little diagnostic tool called mysqlslap that's been around since version 5.1.4. It's a benchmarking tool that can help DBAs and developers load test their database servers.

mysqlslap can emulate a large number of client connections hitting the database server at the same time. The load testing parameters are fully configurable and the results from different test runs can be used to fine-tune database design or hardware resources.

In this article we will learn how to use mysqlslap to load test a MySQL database with some basic queries and see how benchmarking can help us fine-tune those queries. After some basic demonstrations, we will run through a fairly realistic test scenario where we create a copy of an existing database for testing, glean queries from a log, and run the test from a script.

How To Measure MySQL Query Performance with mysqlslap

Sep 29, 2014

First Step before deploying vCloud automation Center vCAC (6.0) is deploying VMware Identity Appliance.VMware Identity Appliance provides single sign-on (SSO) for vCloud Automation Center. Multiple instances of Identity appliance can be deployed for availability purposes.You can use the SSO services from the VMware vCenter ™deployment, if you are running vSphere 5.5 Update 1. Identity appliance is not a mandatory requirement. 

You can use the existing SSO which should be vSphere 5.5 Update 1.With single sign-on (SSO), Active Directory users who are granted access to the vCloud Automation Center portal can log in l with their AD credentials.The Identity Appliance can be deployed using OVA (Open Virtualization Format).

Ensure you have downloaded  vCAC ID Virtual Appliance (SSO) from VMware Website. Connect your vCenter Server using vSphere Web Client. Right-Click on the Cluster where you want to deploy the vCAC ID appliance and Select “Deploy OVF Template”.  and browse towards the directory of vCAC ID appliance OVA file.


Verify the Product name and Version to ensure you are deploying the appropriate version of VMware Identity Appliance and Click on Next.


Click on “Accept” to accept the end user license agreements and click on Next to continue.


Specify the Name and Location for the Identity Appliance and Click on Next.


Select the  Virtual Disk Format and Datastore location to place the identity appliance. Click on Next.


Select the PortGroup from the Drop-down to connect the network for the identity appliance and Click on Next.


Enter the Below details to customize the deployment properties of Identity appliance and Click on Finish to start the  Identity Appliance deployment.
  • Enter Root Password
  •  Hostname
  • Default Gateway
  • DNS
  • IP Addresss
  • IP NetMask

Once Identity Appliance Deployment is completed. You will be able to see the Identity appliance VM under the specified cluster with IP address and hostname configured during the deployment.


Open the VM Console of the Identity Appliance VM to ensure it is properly booted and note down the URL of the Identity appliance admin page URL. Default URL is https://:5480


Access the Identity appliance Admin Page using the URL  https://:5480 “ and Login with root and credentials specified during the OVF deployment.


Click on Admin tab and Select Time Settings. It is recommended to keep your time synced with NTP server.  Enter the Time server details and click on Save Settings.

 
 Click on System and Select the System Time Zone from the drop down and click on Save settings.


Configure the SSO by entering the password for the SSO system domain “vsphere.local” and click on Apply. Ensure that SSO status is changed to “Running”.


In the host settings tab, type FQDN of identity appliance and append SSO port 7444 to host name, In My case, vcac-id.techsupportpk.com:7444 and click on Apply.


Generate the Self signed Certificate or import the Signed Certificate. Select General Self Signed Certificate from the Choose Action drop down menu and click on Replace Certificate. Ensure Status is changed to SSL Certificate is replaced successfully.


Configure the Active Directory authentication  under SSO Tab -> Active Directory. Enter the Domain Name , Domain credentials and click on “Join AD Domain” to join the VMware Identity appliance to Active Directory.

 
Thats’it. We are done with configuring VMware Identity Appliance and we are now ready to deploy vCAC appliance. I hope this is informative for you. 

vCloud Automation Center (vCAC 6.0) Installation Part 3 – Deploy VMware Identity Appliance

Sep 28, 2014

vCloud Automation Center vCAC 6.0 required 3 important components. We should install and configure the below 3 components  and its sub components properly to make use of vCAC website to provision and manage the cloud services along with authoring, administration and governance. ITBM and vCloud Application Director are add-on optional components. ITBM(IT Business Management) helps you to examine the financial data of your infrastructure. vCloud Application Director delivers the application services.


It should be installed and configured in the below order:

1.Identity Appliance – The Identity Appliance is a pre-configured virtual appliance that provides single sign-on for vCloud Automation Center. It is delivered as an open virtualization format (OVF) template. You can also use the SSO services from VMware vCenter Deployment If you are running vSphere 5.5 Update 1

2. vCloud Automation Center Appliance – The vCloud Automation Center Appliance is a pre-configured virtual appliance(OVF) that deploys the vCloud Automation Center Appliance server. It provides the Single portal for self-service provisioning and management of cloud services , as well as authoring,administration and governance. For High Availbality of Portal,you can deploy multiple instances of vCloud Automation Center appliance behind Load balancers

3. Iaas Components Server (Should be installed on Windows Server and MS SQL Database is Mandatory) : Infrastructure as a Service (Iaas)enables the rapid modeling and provisioning of servers and desktops across virtual and physical,private and public, or hybrid cloud infrastructures. Iaas Components of vCAC includes multiple component:



  • IaaS Website
  • Distributed Execution Managers(DEM)
  • Agents
  • Model Manager
  • Manager Service
  • Database
IaaS Website : provides the infrastructure administration and service authoring capabilities to the vCloud Automation Center console. The Website component communicates with the Model Manager, which provides it with updates from the Distributed Execution Manager (DEM), proxy agents and database.

Model Manager : The Model Manager communicates and integrates with external systems and databases. Models included in the Model Manager implement business logic that is executed by a DEM. The ModelManager provides services and utilities for persisting, versioning,securing, and distributing model elements. The Model Manager communicates with a Microsoft SQL Server database, the DEMs, and the console Web site.


Distributed Execution Managers :DEM executes the business logic of custom models, interacting with the IaaS database andexternal databases. Proxy agents – virtualization, integration and WMI agents that communicate with infrastructure resources DEM instances can be deployed in one of two forms:

DEM Orchestrator
  • • Preprocesses workflows, schedules workflows, and monitors DEM Worker instances.
  • • Only one DEM Orchestrator is active at a given time. A standby should be deployed for redundancy.
DEM Worker
  • • Communicates with the external systems
  • • Responsible for executing workflows
Manager Service : The Manager Service coordinates communication between agents,the IaaS database, Active Directory (or LDAP), and SMTP. The Manager Service communicates with the console Web site through the Model Manager.

Agents: Agents, like DEMs, are used to integrate vCloud Automation Center with external systems:
  • Virtualization proxy agents are used to collect data from and provision virtual machines on virtualization hosts, for example, a Hyper-V agent,a vSphere agent, or a Xen agent.
  • Integration agents provide vCloud Automation Center integration with virtual desktop systems, for example, an EPI Windows PowerShell agent, or a VDI Windows PowerShell agent.
  • Windows Management Instrumentation agents enable data collection from Windows machines managed by vCloud Automation Center

vCloud Automation Center (vCAC 6.0) Installation Part 2 – Components of vCAC

In this Modern Enterprise environment, Datacenters are occupied by hardware and software components from multiple vendors. Even some companies have hardware from multiple vendors like HP, DELL,Cisco etc and even mutli vendor hypervisors like vSphere, Hyper-V, Cirtix ZEN, Redhat KVM. How do you manage and provision using all this platform. It is real pain of using multiple admin portals to manage and provision.

vCloud Automation Center provides a secure portal where authorized administrators, developers or business users can request new IT services and manage specific cloud and IT resources, while ensuring compliance with business policies. Requests for IT service, including infrastructure, applications, desktops,and many others, are processed through a common service catalog to provide a consistent user experience. 

vCloud Automation Center (vCAC 6.0) Installation Part 1 – Overview of vCAC

Sensu is a monitoring tool written in Ruby that uses RabbitMQ as a message broker and Redis for storing data. It is well-suited for monitoring cloud environments.

Sensu connects the output from "check" scripts with "handler" scripts to create a robust monitoring and alert system. Check scripts can run on many nodes, and report on whether a certain condition is met, such as that Apache is running. Handler scripts can take an action like sending an alert email.

Both the "check" scripts and the "handler" scripts run on the Sensu master server, which is responsible for orchestrating check executions among Sensu client servers and processing check results. If a check triggers an event, it is passed to the handler, which will take a specified action.

How To Configure Sensu Monitoring, RabbitMQ, and Redis on Ubuntu 14.04

Sep 25, 2014

On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the "Bash Bug", was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable assignments. Because of Bash's ubiquitous status amongst Linux, BSD, and Mac OS X distributions, many computers are vulnerable to Shellshock; all unpatched Bash versions between 1.14 through 4.3 (i.e. all releases until now) are at risk.

The Shellshock vulnerability can be exploited on systems that are running Services or applications that allow unauthorized remote users to assign Bash environment variables. Examples of exploitable systems include the following:
  • Apache HTTP Servers that use CGI scripts (via mod_cgi and mod_cgid) that are written in Bash or launch to Bash subshells
  • Certain DHCP clients
  • OpenSSH servers that use the ForceCommand capability
  • Various network-exposed services that use Bash
A detailed description of the bug can be found at CVE-2014-6271 and CVE-2014-7169.
Because the Shellshock vulnerability is very widespread--even more so than the OpenSSL Heartbleed bug--and particularly easy to exploit, it is highly recommended that affected systems are properly updated to fix or mitigate the vulnerability as soon as possible. We will show you how to test if your machines are vulnerable and, if they are, how to update Bash to remove the vulnerability.

Note: (Sept. 25, 2014 - 6:00pm EST) At the time of writing, only an "incomplete fix" for the vulnerability has been released. As such, it is recommended to update your machines that run Bash immediately, and check back for updates and a complete fix.

Check System Vulnerability

On each of your systems that run Bash, you may check for Shellshock vulnerability by running the following command at the bash prompt:

env VAR='() { :;}; echo Bash is vulnerable!' bash -c "echo Bash Test"

If you see output that looks like the following, your version of Bash is safe:
bash: warning: VAR: ignoring function definition attempt
bash: error importing function definition for `VAR'
Bash Test

If you see "Bash is vulnerable!" as part of your output, you need to update your Bash. The echo Bash is vulnerable! part of the command represents where a remote attacker could inject malicious code, following a function definition within an environment variable assignment. Read on to learn how to update Bash and fix the vulnerability.

Test Remote Sites

You may use this link to test specific websites and CGI scripts: 'ShellShock' Bash Vulnerability CVE-2014-6271 Test Tool.

Fix Vulnerability: Update Bash

The easiest way to fix the vulnerability is to use your default package manager to update the version of Bash. The following subsections cover updating Bash on various Linux distributions, including Ubuntu, Debian, CentOS, Red Hat, and Fedora.

Note: (Sept. 25, 2014 - 6:00pm EST) At the time of writing, only an "incomplete fix" for the vulnerability has been released. As such, it is recommended to update your machines that run Bash immediately, and check back for updates and a complete fix.

APT-GET: Ubuntu / Debian

Update Bash to the latest version available via apt-get:
sudo apt-get update && sudo apt-get install --only-upgrade bash
Now run check your system vulnerability again by running the command in the previous section.

YUM: CentOS / Red Hat / Fedora

Update Bash to the latest version available via the yum:
sudo yum update bash
Now run check your system vulnerability again by running the command in the previous section.
 

Conclusion

Be sure to update all of your affected servers to the latest version of Bash!

How to Protect your Server Against the Shellshock Bash Vulnerability

Sep 20, 2014


The problem with iPhone, iPAD battery life issues is that it is very subjective as it is based on your usage pattern, so it is difficult to pin point what exactly is causing a problem. Check out these tips to see if they help in fixing the battery life problem on your device:

How to fix iOS 8 battery life problems

Sep 17, 2014


If you had accidentally upgraded your iPhone, iPad or iPod touch to iOS 8 or don’t like it or are finding performance issues on older iOS devices and want to downgrade back to iOS 7.1.2, then the good news is that you can downgrade as Apple seems to be still signing the iOS 7.1.2 firmware file.

How to downgrade from iOS 8 to iOS 7.1.2


If you’ve a jailbroken iPhone, iPad or iPod touch, and trying to update it to iOS 8 using OTA update, then you are probably seeing the “Checking for Update” screen as you can see above.

The issue is expected behaviour with jailbroken devices, as most modern jailbreaks like evasi0n and Pangu disable OTA updates to ensure jailbreakers don’t accidentally install the update.

So the only option jailbreakers have is that you have to update your device using iTunes. You can follow these simple instructions to update your iOS device to iOS 8:

Note: Upgrading your device you will end up losing your jailbreak, and the installed jailbreak tweaks.
The iOS 8 update is available as a free upgrade for the following iOS devices:
  • iPhone 5s, iPhone 5c, iPhone 5 and iPhone 4s
  • iPad Air, iPad 4, iPad 3 and iPad 2
  • Retina iPad mini, 1st gen iPad mini
  • 5th generation iPod touch 

 

How to install iOS 8 update using iTunes:

Before you plug in your iOS device. take a moment to make sure you are using the latest version of iTunes. Click on iTunes in the menu bar and then click  on “Check for Updates..”.
Once iTunes is all squared away, it’s time to turn your attention to your iOS device and follow these instructions:

Step 1: Connect your iOS device to your computer using an USB cable. Wait for iTunes to open and connect to your device.

Step 2: Click on device button to the left of the iTunes Store button in the top right corner in iTunes.

Step 3: Click on the “Check for Update” . If the iOS 8 update is available it will automatically download and update your device to iOS 8.


Step 4: You will get a popup message informing you the new update is available. Click on Download and Update button. If it says iOS 7.1.2 is the latest version then download the appropriate firmware file using download links provided in step 5.


Step 5: Skip this step if you iOS 8.0 was available in Step 4.
Download the firmware file for your device using the download links provided below [Note the download file could be as big as 1.7 GB]:

Note: If you’re downloading the firmware file using Safari then ensure that auto unzip feature is disabled or use Chrome or Firefox.

Note: You will be able to find the model number starting with at the back of your device.

Step 7: If you get a popup message informing you that iTunes will update your iPhone/iPad/iPod touch to iOS 8.0 and will verify with Apple. Click on the Update button.

Step 8: It will then show you the release notes for iOS 8. Click on the Next button. Then click on the Agree button for the terms and conditions.

Step 9: iTunes will now download the firmware file (which can take a long time depending on your internet connection as it can be as big as 2.1GB). After downloading the file, it will process it, extract the software, prepare the device for software update, and install the update.

Step 10: Do not disconnect your device until the update has finished. It can take a few minutes. Your device will be updated to iOS 8.0 and reboot once or twice during the process. You will see while Hello screen after it is successfully update.

How to update Jailbroken iPhone or iPad to iOS 8

Sep 13, 2014


Following months of rumors and speculation, Apple took the wraps off its highly-anticipated iPhone 6 and iPhone 6 Plus at its product event on Tuesday afternoon. Advertised as “bigger than bigger,” the iPhone 6 models received a design overhaul, improved

Everything you need to know about the iPhone 6 and iPhone 6 Plus

Sep 10, 2014

This series has meandered down a long and winding path from basic concepts to theory to practice. In this final post, I’m going to show a lot of really boring graphs and charts to answer the big question: What about performance? 

Storage and Hyper-V Part 7: Actual Performance

This series has talked at very great length. Now it’s time to actually get something done. What I’m going to do in this article is show you how to connect to storage. How you connect depends on entirely on how the storage is presented. You can use either PowerShell or the GUI. Since this post is likely to be long anyway, I’ve decided to show only GUI methods.

Storage and Hyper-V Part 6: How To Connect Storage

In the previous parts of this series, our focus was on the basic concepts and theory involved with storage. In this tutorial, we’ll look at some of the ways you can approach your own storage challenges.

Storage and Hyper-V Part 5: Practical Designs

Very little is said about file systems and formatting for Hyper-V Server deployments, but there are often a number of questions. This article in our storage series will examine the aspects of storage preparation in detail.

Storage and Hyper-V Part 4: Formatting and File Systems

This post in our series on storage for Hyper-V is devoted to the ways that a Hyper-V host can connect to storage. This will not be a how-to guide, but an inspection of the technologies.

Storage and Hyper-V Part 3: Connectivity

The first part of this series was dedicated to looking at some of the most basic concepts in storage. In this article, we’ll build on that knowledge to look at the ways you can use multiple drives to address shortcomings and overcome limitations in storage.

Storage and Hyper-V Part 2: Drive Combinations

When it comes to Hyper-V, storage is a massive topic. There are enough possible ways to configure storage that it could almost get its own book, and even then something would likely get forgotten. This post is the first of a multi-part series that will try to talk about just about everything about storage. I won’t promise that it won’t miss something, but the intent is to make it all-inclusive.

Storage and Hyper-V Part 1: Fundamentals

Aug 15, 2014


Do you really want to be available for anyone and everyone on a 24/7 basis?  What do I mean?  A famous person once said that the more available you make yourself; the more available everyone will expect you to be. People will actually be annoyed if you are not instantly and constantly available rather than being pleased when you do call. People expecting you to be available all the time may be annoying.  Cell phone calls follow you everywhere you are including your bathroom.  Even during nighttime when you want to rest, cell phones continue to ring and annoy you.  If it is important, no problem but if it is very menial, why you need to be bothered so late.

Today in this modern society, we live in and the proliferation of cell phones we see people talking anywhere and everywhere.  If used for business, this may prove to be very effective and worthy.  However, for very menial issues being bothered in your sleep and even during your bathroom time may be quite annoying if not outright disgusting.  However, if you make yourself available all the time, you created your own nightmare.

Cell phone etiquette is getting to be a forgotten concept.  You will see people talking on the phone loudly and disturbs people nearby in restaurants and even in offices.  I am sure by now, once or twice in a meeting you will notice that when a cell phone rings, almost everyone around will immediately look for their cell phones.  If you were the one talking, and then the person in front of you talks on his phone, how would you feel?  I am sure you will feel belittled and ignored.  Rude practice, and should be changed.

It may help people who use cell phones to follow certain degree of etiquette with respect to the use of cell phones specially in places where you may seem rude if you use or even when your cell phone rings.

When you are in a place of worship, it may be necessary to leave your cell phone in the house or at least turn it off if you do not want to be away with it.  This is because ringing cell phone will not just disturb you while you pray it will also disturb others.  You do not need to show off your expensive gadget in a place of worship. 

During meetings, please turn off your cell phone; it is rude to have your phone ringing while somebody speaks.  Disruption may cause problems especially when the meeting tackles extremely important issues.  However, if you are waiting for terribly important call, you may use the vibrate mode of your cell phone to alert you when a call is in-coming and leave the meeting if you need to answer the call.  You may also inform the possible caller that you are in a meeting and that you cannot be disturbed.

When traveling and if you are on-board an aircraft, you will be required to turn off your phone.  This is because electronics devices may interfere with the aircraft’s avionics.  Thus, it is a requirement to turn of your phone for safety reasons.  However, for extremely long flights, airline companies allow cell phone usage at a certain time, if you really need to make a phone call, use this time allotted if necessary.

Cell phone have become to be a necessity nowadays, that is why most people use it and cell phone manufacturers have continuously develop different usage and functions for this very small gadget. Be globally competitive, but you should understand that being rude is not part of modernity.  Follow certain degree of etiquette; this will be very helpful to you and your business.

Do you really want to be available all the time?

Aug 7, 2014


Bloomberg reports that China has prohibited its government agencies from buying Apple products due to security concerns.
The report claims that Apple products

China bans Apple products from government purchases due to securityconcerns

Aug 6, 2014

Relational database management systems like MySQL and MariaDB are needed for a significant portion of web sites and applications. However, not all users feel comfortable administering their data from the command line.

To solve this problem, a project called phpMyAdmin was created in order to offer an alternative in the form of a web-based management interface. In this guide, we will demonstrate how to install and secure a phpMyAdmin configuration on a CentOS 7 server. We will build this setup on top of the Nginx web server, which has a good performance profile and can handle heavy loads better than some other web servers.

How To Install and Secure phpMyAdmin with Nginx on a CentOS 7 Server

Aug 5, 2014


A deadlock occurs when two or more sessions are waiting for data locked by each other, resulting in all the sessions being blocked. Oracle automatically detects and resolves deadlocks by rolling back the statement associated with the transaction that detects the deadlock. Typically, deadlocks are caused by poorly implemented locking in application code. This tutorial shows the steps necessary to identify the offending application code when a deadlock is detected.

How to identify the offending application code when a deadlock is detected in Oracle Database.

The packaging formats used by different distributions of Linux can be a pain point for software developers wishing to release their projects in an easily consumable way. Debian and Ubuntu rely on .deb packages, while Fedora and RedHat both use .rpm style packaging systems. These are incompatible and the tools needed to create them can be rather difficult to work with for those unfamiliar with the eccentricities of each.

While package maintainers for distributions do the heavy lifting for packages included in the official repositories, if you plan on releasing software for these distributions on your own site or need to create packages for your organization, you will usually want to provide packages yourself. This traditionally involved learning the workings of at least a few tools for each of the packaging families.

To minimize the complications of this process, a tool called fpm was created. Using fpm, you can easily create both .deb and .rpm files without having to know any of the commands of the packaging tools that it leverages. In this article, we will discuss how to use fpm to create packages of different formats using an Ubuntu 14.04 server.

How To Use FPM To Easily Create Packages in Multiple Formats

Aug 1, 2014

Google’s Android is absolutely killing it when it comes to smartphone market share. Latest numbers from Strategy Analytics for the second quarter of 2014 show that Android’s market share reached an all-time high of 85 percent.

According to the firm’s report, smartphone shipments grew by 27 percent year-over-year to 295 million units, and Android’s share grew by 5 percent in the last year to 85 percent. What’s unexpected is that Samsung, the dominant Android smartphone maker, lost marketshare despite Android growing as a whole. This is probably because Android’s growth has largely been driven by low and mid-range smartphone sales in developing nations, which will probably further accelerate thanks to Google’s Android One initiative.

Apple’s marketshare fell from 13.4 percent last year to 11.9 percent this year, despite seeing an increase in absolute iPhone shipment numbers. Microsoft’s marketshare went from 3.8 percent to 2.7 percent over the past year, while BlackBerry fell from 2.4 percent to a measly 0.6 percent.

What we’ll be looking out for in the next few quarters is how big of an impact does the larger iPhone 6 launch have on these numbers.

Android market share reaches an all-time high of 85%; iPhone falls to 11.9%

Jul 22, 2014

LEMP software stack is a group of open source software that is typically installed together to enable a server to host dynamic websites and web apps. This term is actually an acronym which represents the Linux operating system, with the ENginx web server (which replaces the Apache component of a LAMP stack). 

The site data is stored in a MySQL database (using MariaDB), and dynamic content is processed by PHP.
In this article, we'll get a LEMP stack installed on an CentOS 7 Server. CentOS will fulfill our first requirement: a Linux operating system.

How To Install Linux, Nginx, MySQL, PHP (LEMP) stack On CentOS 7

Jul 20, 2014

When you first begin to access your fresh new virtual private server, there are a few early steps you should take to make it more secure. Some of the first tasks can include setting up a new user, providing them with the proper privileges, and configuring SSH.

Initial Server Setup with CentOS 7

Jul 9, 2014

HAProxy, which stands for High Availability Proxy, is a popular open source software TCP/HTTP Load Balancer and proxying solution which can be run on Linux, Solaris, and FreeBSD. Its most common use is to improve the performance and reliability of a server environment by distributing the workload across multiple servers (e.g. web, application, database). It is used in many high-profile environments, including: GitHub, Imgur, Instagram, and Twitter.

How To Implement SSL Termination With HAProxy on Ubuntu 14.04

Jul 1, 2014

DNS, or the Domain Name System, is often a difficult component to get right when learning how to configure websites and servers. While most people will probably choose to use the DNS servers provided by their hosting company or their domain registrar, there are some advantages to creating your own DNS servers.

In this guide, we will discuss how to install and configure the Bind9 DNS server as authoritative-only DNS servers on Ubuntu 14.04 machines. We will set these up two Bind servers for our domain in a master-slave configuration.

How To Configure Bind as an Authoritative-Only DNS Server on Ubuntu 14.04


DNS, or the Domain Name System, is often a difficult component to get right when learning how to configure websites and servers. While most people will probably choose to use the DNS servers provided by their hosting company or their domain registrar, there are some advantages to creating your own DNS servers.

How To Configure Bind as a Caching or Forwarding DNS Server on Ubuntu 14.04

Jun 28, 2014


Pangu jailbreak for iOS 7.1.X released last week to everyone’s surprise by a mysterious team of Chinese jailbreak developers. It was however only available for Windows, and the entire interface was in Chinese. The Pangu team today updated their jailbreak tool to v7.1, adding a Mac version, and English support. This post gives you step-by-step instructions to jailbreak your iOS device with Pangu for Mac.

How to Jailbreak iOS 7.1 – iOS 7.1.1 using Pangu for Mac

Jun 23, 2014


In this article, we are going to show you how to use Apache JMeter to perform basic load and stress testing on your web application environment. We will show you how to use the graphical user interface to build a test plan and run the tests against a web server.

JMeter is an open source desktop Java application that is designed to load test and measure performance. It can be used to simulate loads of various scenarios and output performance data in several ways, including CSV and XML files, and graphs. Because it is 100% Java, it is available on every OS that supports Java 6 or later.

How To Use Apache JMeter To Perform Load Testing on a Web Server

Jun 17, 2014


Most OEMs are now openly embracing the Android development community and Motorola is no different. After years of locking the bootloader on their devices, the company now offers an official bootloader unlock tool, which makes it easy for developers and users alike to tinker with their Moto devices.

The Moto E is no exception to this rule and comes with an unlockable bootloader, which makes it relatively easy to root. If you are looking to root your Moto E, follow the steps listed below to gain root access on your handset in no time.

The first thing you need to do is unlock the bootloader of your Moto E usingMotorola’s web unlock tool. Keep in mind though, that this will wipe your device of all data so make a backup before you proceed with the steps. After you are done unlocking the bootloader, follow the steps below.

Step 1: Download the required ADB/Fastboot files from below, if you did not already do it while unlocking the bootloader. Also, download the TWRP recovery and SuperSU ZIP file for your handset from below.

Make sure to rename the TWRP file to “motoe.img” for simplicity sake. Keep the ADB/Fastboot and TWRP image file inside a new folder called “moto” on your desktop. Open up a new command prompt or terminal window and navigate to this folder using the ‘cd’ command.

Step 2: Reboot your device into fastboot mode by pressing the Volume down + Power button at the same time. Now, connect it to your PC and enter the following commands in the Command prompt or terminal window opened in the previous step:

fastboot devices

The above command will make sure that the device has been detected by your PC. Mac users, make sure to prefer a “./” before every fastboot command, e.g. ./fastboot devices.

Now, we need to flash the recovery on the device using the following command -:

fastboot flash recovery motoe.img

Step 3: Reboot your device into Android OS and transfer the SuperSU ZIP file to the internal storage of the handset.

Step 4: Proceed to switch of your device and reboot it into recovery mode by pressing the Volume Up + Power button. Then tap the ‘Install’ button and select the SuperSU ZIP file you had transferred to the device in the previous step. After the ZIP file has been flashed, reboot your device into Android OS.

The first boot might take sometime so please be patient. You have now successfully managed to root your Moto E and can now use any root app you like.

How to root the Moto E


Parallels on Tuesday announced an update to its subscription-based Parallels Access remote desktop app, adding new gestures and controls to support operation on smartphones like Apple's iPhone. With the latest Parallels Access version 2.0 for iOS, the software firm best known for its virtualization software has made its iOS remote control app universal.

Parallels Access goes universal - extends Mac and Windows remote desktop controls to iPhone


Getting a credit card that offers cash back always sounds like a good idea.  What could be better than getting cash back on all the purchases that you make with your credit card?  It sounds too good to be true, doesn’t it?   

Credit Card Debt - The Worst Debt To Have Hanging Over Your Headrevised



Getting a credit card that offers cash back always sounds like a good idea.  What could be better than getting cash back on all the purchases that you make with your credit card?  It sounds too good to be true, doesn’t it?  

Cash Back Credit Cards A Good Idea Or A Sneaky Way To Get You To Sign Uprevised

Tnic VPN Layout
In this article, we are going to show you how to use Tinc, an open source Virtual Private Network (VPN) daemon, to create a secure VPN that your servers can communicate on as if they were on a local network. We will also demonstrate how to use Tinc to set up a secure tunnel into a private network. We will be using Ubuntu 14.04 servers, but the configurations can be adapted for use with any other OS.

How To Install Tinc and Set Up a Basic VPN on Ubuntu 14.04

Jun 16, 2014


Children’s unorthodox spelling and grammar while texting does not stop them learning the rules of formal English, suggests research. Just over 160 children, aged between eight and 16, from the West Midlands, took part in the snapshot study.
The researchers

Texting ‘can boost children’s spelling and grammar’


SSH comes out of the box with quite a few security feature to make sure that your connections are secure and that you can authenticate to a remote host without worries. In particular, SSH keys create a secure way to connect without transmitting your password or passphrase over the internet.

However, there are situations where using an SSH key is not reasonable or might actually be insecure. Let's say that you are trying to use SSH from a public computer or a computer that you are trying to troubleshoot for a friend. The public key system assumes that the computer that you are connecting from is at least somewhat trustworthy. This is not always the case.

How To Install and Use OTPW for Single-Use SSH Passwords on Ubuntu 14.04

Jun 11, 2014

Deus Ex The Fall (1000 Redeem Code AppStore)

The Wolf Among Us Episode1 (1000 Redeem Code AppStore)


OCSP stapling is a TLS/SSL extension which aims to improve the performance of SSL negotiation while maintaining visitor privacy. Before going ahead with the configuration, a short brief on how certificate revocation works. This article uses free certificates issued by StartSSL to demonstrate.

How To Configure OCSP Stapling on Apache and Nginx

 
TECH SUPPORT © 2012-2017