Pages

udev: renamed network interface eth0 to eth1

If we deploy Red Hat Enterprise Linux 6 virtual machine from template or clone a virtual machine in VMware vSphere then most probably we won't have network on our new virtual machine. The bootup messages about the network interface will show,

# dmesg | grep -i eth0
eth0: NIC Link is Up 10000 Mbps
udev: renamed network interface eth0 to eth1

Let's check the current ethernet devices,

Project Guidelines and Project Format for SMUDE IT Students

Are you looking for university project format and project guidelines? Are you participating in any of these programs - Bachelor of Science in Information Technology (B.Sc.I.T.), Master of Science in Information Technology (M.Sc.I.T.), Master of Science in Telecom Technology (M.Sc.T.T.), Bachelor in Computer Applications (B.C.A.) and Master in Computer Applications (M.C.A.) from Sikkim Manipal University Distance Education? If yes, then here is the list of material, project format and project guidelines that should be prepared by each IT student who has registered for the SMUDE project examination. The format and guidelines are published for Fall 2012 IT students.

Hackers’ nightmare effective ‘Information Security’

The term information Security has evolved drastically with the advancement of technology in recent years. Now, it is quite a wide term to deal with. Information Security denotes an installation of security mechanism to ensure the safety of information and information systems by restricting unauthorized access and unwanted disclosure of information. The layer of security is also implemented to further avoid any disruption, undue modification, perusal, recording, inspection or destruction.

It’s time to say good bye to popular spam filtering and e-mail archiving cloud based product, Postini

Since Google acquired Postini in 2007 to create a more complete Google Apps solution that addresses the information security and compliance issues facing businesses of all sizes, Google has been working towards integrating numerous Postini features directly in Google Apps, such as user policy management; email content filters; archiving, retention and eDiscovery with Google Apps Vault; and many more.

Salesforce.com calling all technology professionals at Dreamforce 2012

Salesforce.com, an enterprise cloud computing company that is reborn as social enterprise, having its base in California, already marking its strong presence across the globe. Salesforce.com is leading company bestowing the products in the areas of sales force automation, customer relationship management, customer service, support & help desk, social media monitoring and marketing, cloud application development, enterprise social network and finally human resource performance management.

Salesforce Administration Essentials - ADM 201

Hi, through this post I would like to share with you an astounding experience that I have gained through attending a training session program called as Salesforce Administration Essentials (ADM 201) recently. It was an amazing experience that increases my knowledge in replete. The program largely caters to those who are either new Salesforce CRM administrator or already established ones, who are in search of a viable option to solve complex business queries and exert more from Salesforce CRM. In either case, the aforementioned program will give a boost to your career. Though, the training session was scheduled for five days but we had to wrap up the things in three days owing to time constraint.

FreePBX: A Road Map View

FreePBX is an extremely easy to use graphic user interface (GUI) that is used for controlling and managing the highly popular open source telephony software ‘Asterisk’. FreePBX is a result of extreme hard work bestowed by thousands of volunteers. FreePBX is developed gradually with the course of time. So far, FreePBX has been downloaded more than 5,000,000 times. You can gauge the popularity of FreeePBX with aforementioned statistics. And, as per the rough estimate, at present there are more than 5,000,000 FreePBX enabled phone system.

A2billing: The blue Print

A2billing is a product of star2billing.com. In a nutshell, A2billing is type of class 4 and class 5 softswitch comprising inline billing exclusively designed for residential and business purpose. Moreover, it is also used in wholesale VoIP services, calling cards and call-back. In addition, A2billing has a usage in telephone number resale.

Moreover, A2billing is absolutely free open source software exclusively designed for Asterisk. It has numerous benefits in providing effective telecom customer management including admin, agent, and customer along with online signup pages. This all comes with flexible inline rating, billing of calls and services in real time.

Asterisk PBX: A Comprehensive View

Asterisk is an open source private branch exchange originally designed and developed by Mark Spencer from Digium way back in 1999. During the late nineties Mark saw enormous business opportunity providing professional support to Linux operation system. He observes an urgent need for a call distribution system which is capable to distribute calls equally among his group comprising Linux experts. Unfortunately, building of such infrastructure requires expense of millions of dollar to his organization.

Effective Project Management through ‘do.com’

UPDATE: On January 31, 2014, the Do.com service will be discontinued.

These days, each and every task is performed in an organized manner in almost every industry, be it retailing, advertising or any other industry. Organized working and effective project management has increased the productivity. In the same league, website management is no exception. Better website management bestows effective website navigation which ultimately increases the site traffic.

Net-SNMP v3: Brief Overview

Simple Network Management Protocol (SNMP) is an Internet-standard Application Layer protocol used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. The SNMP agent receives requests on UDP port 161 and the manager receives notifications (Traps and InformRequests) on port 162 but when SNMP is used with Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) requests are received on port 10161 and traps are sent to port 10162.

Ping: How to turn off ICMP ECHO Response on Linux Server

Kernel parameters provide a mechanism to adjust the functioning of the Linux kernel. The sysctl command can be used to view and set kernel parameters and ping response can also be denied by just changing the kernel parameter value. Let's check the present value of kernel parameter,

# sysctl net.ipv4.icmp_echo_ignore_all

Character Encoding: Convert from UTF-8 to ISO-8859-1

The iconv program converts the encoding of characters in an input file from one coded character set to another. The commands here have been tested on RHEL 5 but it should work on other Linux distributions just fine,

I already have a test UTF-8 encoded file,

# file -bi TestspecialchrUTF.txt
text/plain; charset=utf-8

Change Login Shell of Linux User

This post will show you how to change the login shell of linux user. You can change the login shell while creating a new user account or for an existing user account. If you are creating a new user then simply use -s or --shell option in useradd command but if you like to change the login shell of an exiting user then use chsh or usermod command.