Converting data types from one to another is a most basic aspect for any programmers.
First, let us start with the basics.
int nNumber;
The following are few things to keep in mind for the above line of code:
[continue reading…]
Converting data types from one to another is a most basic aspect for any programmers.
First, let us start with the basics.
int nNumber;
The following are few things to keep in mind for the above line of code:
[continue reading…]
We have ntbackup in Windows where we can take the “system state backup” for backing up the domain controller.
This tutorial explains how we can backup the Samba configuration, after you’ve setup Samba as active directory domain controller in Linux.
First, we need to understand what files and folders we are going to backup, and what tools we need to scheduled samba backup.
For Samba, we need to backup two database called as LDB and TDB. We are also looking at backing up the configuration files and sysvol .
[continue reading…]
Design pattern generally solves few typical programming challenges and makes it more scalable, reusable and meaningful.
It provides a generalized solution for frequently encountered problems, which typically tends to increase the total number of lines of code a program has to write.
The following are few benefits of understanding and using Design Patterns:
[continue reading…]
Android provides a user level interface for VPN services with which programmer only need to focus on the interaction with remote server.
Other actions, such as virtual interface creation, address and route configuration are done by OS.
From the APP side, there are two components for a VPN connection, the client and the service.
[continue reading…]
Readline also provides you with the ability to map your own custom keybindings by editing the .inputrc configuration file in your home directory.
The following are two types of custom keybindings you can define:
Kerberos is a network authentication protocol.
Kerberos provides a strong cryptographic authentication against the devices which lets the client & servers to communicate in a more secured manner. It is designed to address network security problems.
When firewalls acts a solution to address the intrusion from the external networks, Kerberos usually used to address the intrusion and other security problems within the network.
[continue reading…]
Javascript is a powerful scripting language for developing dynamic web pages.
While it has always been a powerful client side scripting language, it has also evolved as a server side scripting language with the introduction of Chrome V8 engine based Node.js javascript framework. For some, Javascript is serving as a one stop solution for both web/mobile client side and server side scripting.
One of the scripting constructs used in advanced javascripting is called Closures.
[continue reading…]
This tutorial explains few practical and useful scenarios in using the tshark command.
You’ll understand how to auto-save captures to multiple files, auto-save captures based on time limits, specify your own buffer size for capture, extract specific fields from the capture, and display statistics for a specific protocol from a capture.
[continue reading…]