Who is Computer Hacker?

Who is Computer Hacker?

In Magnet Tech we had organised two Hackfest in past one and half years. During Hackfest, new guys who were participating in Hackfest always have common query/question in there mind… ie nothing but “Who is Computer Hacker?”. Defination – “Hacker is a person who enjoys learning the details of computer systems and how to stretch …

Read More Read More

MySQL Replication ( One master multiple slave )

MySQL Replication ( One master multiple slave )

Introduction : – MySQL Replication allows databases on one MySQL server to be duplicated on another, were introduced in MySQL 3.23.15. For a description of the syntax of replication-related SQL statements,I suggest that you visit Web site at http://www.mysql.com often and read updates to this chapter. Replication is constantly being improved, and updates the manual …

Read More Read More

Unable to Verify HTTPS Certificate (Unknown Authority)

Unable to Verify HTTPS Certificate (Unknown Authority)

I facing same problem since few day after creating certificate for Secure HTTPS sites. then whenever I am browsing sites with https it was showing me error like “Website Certified by Unknown Authority – unable to verify the identity of indiangnu.org site” I was thinking that this might be problem with browser incompatibility issue and …

Read More Read More

Rsync Client script

Rsync Client script

This is the Rsync client side shell scrpit.. You can specify setting for backup in backup.conf file and set cron job. This script will take backup of mentioned directory of respective users at given time. 1] sample backup file – root@indiangnu.org:/home/arun# cat /etc/backup/backup.conf #This is the Backup conf for client #username:path_to_backup:where_to_backup:when_to_backup:time: #when_to_backup=> daily=1,weekly=2, monthly=3 #where_to_backup=>USERNAME …

Read More Read More

Authentication modules in Linux/Unix – PAM

Authentication modules in Linux/Unix – PAM

Pluggable authentication modules or PAM provides a way to develop programs that are independent of authentication scheme. These programs need “authentication modules” to be attatched to them at run-time in order to work. Which authentication module is to be attatched is dependent upon the local system setup and is at the discretion of the local …

Read More Read More

phonewala.com

phonewala.com

Features of PhoneWala.com PC-to-Phone Service Phonewala.com is an Internet telephony service. It connects your PC to any telephone (fixed line as well as mobile) around the world. The calls are established using the IP technology. With this service you can now call your friends and family anywhere around the world, at a fraction of regular …

Read More Read More

VOIP service in India

VOIP service in India

I dont know what got me suddenly but yesterday I wanted to know all that is legal & available w.r.t VOIP.So I made a call to Mr.Adil.Doctor who is the Linksys Sales Manager(India) & is located at Cisco Systems Pvt Ltd,Mumbai. After getting a brief idea about where VOIP is in India he informed me …

Read More Read More

Asterisk Saga!!

Asterisk Saga!!

We worked on an Asterisk setup project couple of months ago. It was a rocking experience. Me being in the story, has written up a saga on it! Credits to the whole team that worked on it!Here you go on the Asterisk Saga! It was Friday evening, Time to party. Not just yet! We came …

Read More Read More