CONTAINERIZATION: MEET THE FUTURE VIRTUALIZATION

Over the past decade virtualization technologies have gone from educational tools to full blown IT solutions. Virtualization has many benefits, among them application isolation and utilization of hardware resources are most valuable cause it gives more operational flexibility. Many organizations invest their money in virtualization technology. Virtual environment is easier …

10 steps to secure your system

The goal of the Information security is Confidentiality, Integrity and Availability are also known as CIA triad. The security people who are protecting, and the bad people who are breaking the security are actually trying to protect and break these three things. The best and easy example is a DDOS …

How to use vim editor

If you are a Linux user then you already know that in Linux everything is written in the file. A device in Linux is represented as a file, for configuring a service you have to edit lots of files like a mail server or a web server, even firewall information is …