Being a Network administrators, systems administrators we always like to have some tools handy to look into, troubleshoot or just to figure things out. There are many open source, free tools available specialized for different purposes In this blog I shall attempt to list some of them, give a brief description and list the available… Continue reading Essential tcp ip network tools, network Swiss army knife
Computer and human interface will probably be one of the most important areas of development in next few decades. While we work to master our technology to make computers work for us more efficiently, and double processing power every 18month, little we have seen to improve our direct interaction with computers. What we seen is… Continue reading The future of computer human interface, BrainGate
Are you still using IE? According to statcounter, Google Chrome has finally overtaken IE last week. It also shows a slow decline on Firefox usage. It would be interesting to follow this chart once Windows 8 comes out. Maybe in windows tablet they will force us to use Internet explorer? Maybe in this browser war… Continue reading Are you still using IE?
Today I got real excited seeing this WiFi blocking wall paper block in Gizmodo. I see these wall papers giving us capability of having scalable network in an enterprise environment. Most of the blogs I have come across is mainly about keeping home WiFi network single out of neighbor reach (security). This is a good… Continue reading Wifi blocking wallpapers from a different point of view, for enterprise users
Setting up backup mail exchange server with sendmail Most systems admin is used to setting up the primary mail server, but many of them (like me) are not used to setup a backup mail server in a regular basis. This is my attempt to create a complete document on setting up a backup mail server… Continue reading Setting up backup mail exchange server with sendmail
A random number generator (RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern. There are many methods of generating randomness, existed from ancient time like dice, coin flipping shuffling or playing cards. Among many use of random number, in computer cryptography is probably the most important one in modern technology… Continue reading Subatomic Noise in a Vacuum is truly random:
An organization needs to maintain a repository of information. This includes common knowledge or business specific information such as white papers, user manuals, policy document, knowledge tags, or answers to frequently asked questions. A general purpose document management system can fill the void, however a single purpose knowledge base system will be a far better fit. A… Continue reading Knowledge base Systems, a review on phpMyFAQ
First I read about this firefox addon called Collusion at Gzimodo. This addon enables us to watch, how we are getting tracked using our own browser. Internet privacy is a widely talked about issue, however we have a little tangible understanding on how it works or how it effects us individually or as a society.… Continue reading Who is tracking you online? The BIG Brothers? So many of them?
When we think about email collaboration/unified messaging the first things comes into our mind is Microsoft exchange, probably not because they pioneered email collaboration but because they have great success of with all enterprise segments, more importantly the end users to felt the impact of email collaboration. Microsoft Exchange Server 4.0 was released at 1996… Continue reading Email collaboration for enterprises and Zimbra
Heart beat is your new encryption key! According to New Scientist every ones heartbeats in a very unique rhythm. It is so unique that there is no chancing of you beating the same beat twice. An electrocardiograph (ECG) would know the difference. They shall probably use your bit to create a secret key. This is… Continue reading Random Heart beat