1) Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. In some cases, peer-to-peer communications is implemented by giving each
DEFINITION of second-level domain
A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address). The second-level domain name includes the top-level domain (top-level domain) name.
DEFINITION of Red Hat Storage
Red Hat Storage is a new distributed file system (DFS ) based on the Gluster file system.
Red Hat first introduced the feature, also called Red Hat Storage Server for On-premise, in Red Hat Enterprise Virtualization (RHEV) 3.1.
DEFINITION of public key
In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.
InetServices Now Offers Hadoop for Big Data
For big data environments an Apache Hadoop cluster provides the performance and resilience required for large data mining. Built on high-performance hardware, a Hadoop dedicated server or cloud server cluster from InetServices delivers a superior platform backed by an industry leading 100% uptime service level agreement.
How to convert rpm file to deb file
In Red Hat based linux the package file extension comes in .rpm format .(RPM means Red Hat Package Manager).Sometimes there are some package which are available in rpm file. Hence for installing these package in Debain based OS we have to convert rpm file into deb file.
How to change mysql default port in Linux
To change the MySQL Server default port no. 3306,follow the given below steps.
1. Check the aviailbe port in system first:
# netstat -tanp |grep xxxx
How Public and Private Key Cryptography Works
In public key cryptography, a public and private key are created simultaneously using the same algorithm (a popular one is known as RSA) by a certificate authority (CA). The private key is given only to the requesting party and the public key is made publicly available (as part of a digital certificate) in a directory that all parties
DEFINITION of PKI
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a
DEFINITION of network analyzer
A network analyzer (also called a protocol analyzer or packet analyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls, anti-virus programs, and spyware detection programs.