09 June 2010
Finally we got new for Red Hat Enterprise Linux 6, RedHat released first public Beta version of RHEL6 on April 21, 2010, with many changes like good power management, changes in virtualizations (Xen Replaced by KVM) and you can run RHEL 5 Virtual image on it with converting Xen virtualization images to KVM. and good work on performance, EXT 4 and so many changes.
12 May 2010
If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation). The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies. Please ask the students to contact the people mentioned below to get the application form:
580,Shubhakar, 44th cross, 1st A main road, Jayanagar 7th block, Bangalore
1. Ms. Saraswati 99009 06338
2. Mr. Shivkumar 99866 30301
3. Ms. Bindu - 99645 34667
Even if you don't know anyone, please pass on this info, someone might be in need of this help.
Thanks Vijiya for sharing this info.
12 April 2010
01 April 2010
It is an eight-bit field helps prevent datagrams from persisting (e.g. going in circles) on an internet. This field limits a datagram's lifetime. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In latencies typical in practice, it has come to be a hop count field. Each packet switch (or router) that a datagram crosses decrements the TTL field by one. When the TTL field hits zero, the packet is no longer forwarded by a packet switch and is discarded. Typically, an ICMP message is sent back to the sender that it has been discarded.
In addition to that there is a good reason to use this field, i.e. for identifying the other end PC, device or OS.
goto command prompt (in linux goto terminal)
and use ping command to identify the availability of other end device.
You will find :
OS/Device Version Protocol TTL value
AIX 3.2, 4.1 ICMP 255
BSDI BSD/OS 3.1 and 4.0 ICMP 255
Cisco ICMP 254
HP-UX ICMP 255
HP-UX TCP 64
Linux 2.0.x kernel ICMP 64
Linux 2.2.14 kernel ICMP 255
Linux 2.4 kernel ICMP 255
Linux Red Hat 9 ICMP and TCP 64
NetBSD ICMP 255
Solaris 2.5.1, 2.6, 2.7, 2.8 ICMP/TCP 255/64
SunOS 5.7 ICMP and TCP 255
Windows for Workgroups TCP and UDP 32
Windows 95 TCP and UDP 32
Windows 98 ICMP/TCP 128
Windows NT 4.0 TCP and UDP 128
Windows Server 2003 128
Windows XP ICMP/TCP/UDP 128
22 March 2010
09 March 2010
I was facing this issue since last few days and never realized that this is due to Skype program that I have recently installed. So looks like Skype try to use Port 80 on your machine and interfere with IIS server. Following are additional details on this issue:
IIS Manager Error: The process cannot access the file because it is being used by another process. (Exception from HRESULT: 0x80070020) - http://forums.iis.net/t/1086489.aspx
02 March 2010
But if this is that much secure then why web applications are still having default protocol HTTP (port no. 80)?
This we can understand by this conversation:
Client: Hello!! http://www.laksha.net/
Client connects to TCP port 80 and wants this host
Here http tells webserver which host is requested with which configuration and what content shall be presented to the client
Webserver: Hi!! I have http://www.laksha.net/
Gives respective configuration and presents content at the client.
But in other hand SSH and other secure service like TLS behaves like they are possessed. They don’t even tell webserver which webserver is requested. SSH require any server IP address can have only on website hosted on it. It means when client connect to webserver through port number 443, it needs a signed certificates.
01 March 2010
Security is a protection to any thing. So Information security is protection of organizational valuated assets from any kind of treats, to ensure low business risk, business continuity and maximum benefits from the investments.
Security may concern from outsiders (e.g. Hacker), or insiders (e.g. Disgruntled Employee).
Information Security can achieved by set of policy, procedures & process i.e. controls. The Information Security is covered under ISO-27001:5000.
Information Security Consultant
New Delhi, India.
20 January 2010
My company AHS found many people receiving emails related to the virus, W32.Ackantta.C@mm, which is a mass-mailing worm that spreads through file-sharing programs and sends spam email that contains links to malicious files.
The email has the below types of characteristics. If you receive an email with the below Subjects or Attachments, please do not open the attachment or click any of the links in the email, please just delete the email.
· Subject of Email:
· You have received A Hallmark E-Card!
· Your friend invited you to twitter!
· Jessica would like to be your friend on hi5!,
· Shipping update for your Amazon.com order 254-78546325-658742
· Name of Attachment:
· Invitation Card.zip
· Shipping documents.zip
Please feel free to share this information with others.