Red Hat Storage is a new distributed file system (DFS ) based on the Gluster file system.
Red Hat first introduced the feature, also called Red Hat Storage Server for On-premise, in Red Hat Enterprise Virtualization (RHEV) 3.1.
DEFINITION of public key
In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.
InetServices Now Offers Hadoop for Big Data
For big data environments an Apache Hadoop cluster provides the performance and resilience required for large data mining. Built on high-performance hardware, a Hadoop dedicated server or cloud server cluster from InetServices delivers a superior platform backed by an industry leading 100% uptime service level agreement.
How to convert rpm file to deb file
In Red Hat based linux the package file extension comes in .rpm format .(RPM means Red Hat Package Manager).Sometimes there are some package which are available in rpm file. Hence for installing these package in Debain based OS we have to convert rpm file into deb file.
How to change mysql default port in Linux
To change the MySQL Server default port no. 3306,follow the given below steps.
1. Check the aviailbe port in system first:
# netstat -tanp |grep xxxx
How Public and Private Key Cryptography Works
In public key cryptography, a public and private key are created simultaneously using the same algorithm (a popular one is known as RSA) by a certificate authority (CA). The private key is given only to the requesting party and the public key is made publicly available (as part of a digital certificate) in a directory that all parties
DEFINITION of PKI
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a
DEFINITION of network analyzer
A network analyzer (also called a protocol analyzer or packet analyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls, anti-virus programs, and spyware detection programs.
DEFINITION of Internet Explorer Administration Kit
Internet Explorer Administration Kit (IEAK) is a product from Microsoft that enables an organization to centrally manage the customizing, deployment, and maintenance of Microsoft’s Web browser, Internet Explorer, for users on different computer platforms. There is no royalty on the deployed copies. Using IEAK, a company can set up every user’s browser the same way. Microsoft offers a step-by-step process for using the kit.
DEFINITION of host
The term “host” is used in several contexts, in each of which it has a slightly different meaning:
1) In Internet protocol specifications, the term “host” means any computer that has full two-way access to other computers on the Internet. A host has a specific “local or host number” that, together with the network