WINTER INDUSTRY FOCUSED TRAINING

MAKING INDIA, VIRTUAL READY – CLOUD !! WINTER INDUSTRY FOCUSED TRAINING 2016 – 2017 (Exclusively for our LinuxWorld Students only) Completely Designed & Delivered by – Mr Vimal Daga – Inculcating Actual need of corporate (Use Cases) Utilise your Winter Vacations at right place under [Read More]

History of Linux

In 1969, Four programmer Ken Thompson, Dennis Ritchie, Rudd Canady & Doug McElroy made a program in Bell labs which does not have any name in year 1969. Brian Kernighan checked that program & found it is very good software for client & networking purpose. [Read More]

Red Hat Cluster Notes

1) Cluster types: – High Availability / Failover cluster (Ideal for Database, file servers) – Load Balancing  (Ideal for high load web traffic) – High Performance (Large computational problems) 2) Clustering can be implemented in two ways . – Active – Active ( Both nodes [Read More]

Why do hackers prefer Linux?

  Also in today’s open source roundup: The best Linux desktop for customization, and how Star Trek inspired people with technology Why do hackers prefer Linux? Linux has much to offer any computer user, but it has proven to be particularly popular with hackers. A [Read More]

LOGICAL VOLUME MANAGER

1. Why LVM is required ? LVM stands for Logical Volume Manager , to resize filesystem’s size online we required LVM partition in Linux. Size of LVM partition can be extended and reduced using the lvextend & lvreduce commands respectively. 2. Is it possible to [Read More]

Linux Server Tips

1. Proxy Server and its use. A proxy server is a computer server which gives the client system an indirect access to spme other network or service. A client connects to the proxy and requests connection, file, services available on a different server. The proxy [Read More]