Ideas for Choosing the Perfect Writer’s Laptop

In the modern era, a computer – especially laptop – is the essential tool for aspiring writers. Indeed,writer with pen you probably don’t lay your hands on a typewriter anymore unless you are a very old school person. The modern laptops are much better tools for those who have something to say and want to put in on paper or Internet. Me, being some kind of a writer as well, have been using ASUS ZenBook for a couple of years. It is a good writer’s notebook however not the only successful choice. In this article, I will point out some things important for a writer on a laptop hunt.

netstat – 10 Most common usage with examples

netstat is a command line utility in Unix, Linux and Unix like systems to show information about

  • network connections,
  • routing tables,
  • interface statistics,
  • mas-querade connections
  • multicast memberships

By default, netstat displays a list of open sockets of all configured address families , tcp , udp etc.
netstat provide very extensive network details and here are the top netstat usage with different options to get you the just the information you need.

How to Build a Winning Business Model in Enterprise Mobility

Strategy, business models, and tactics are often used interchangeably but they differ slightly in their actual meaning. Business model is the means of identifying a solution’s key offerings that will make customers pay for the product/service.

Business model is defined at the outset, when the enterprise mobility solutions are discussing a potential application idea. It is crucial to get all aspects of the business model right, and the ambiguities (if any) listed and categorized as ‘needed to be addressed before development’ or ‘can be expounded on later’.

chmod Quick Referance with Examples

What is chmod ?

chmod ( Change Mode ) is a command line utility in Unix , Linux and other Unix like systems to change the read, write, execute permissions of a file for owner , group and others.

How to use chmod?

Chmod command is used in two ways :
1. Using octal value & position : Sets the permission for owner, group and others with octal values , 4 for read , 2 for write , 1 for execute and any sum of these number to get cumulative permissions.

SHA-1 Collision – Insecurity of SHA-1 exposed by Google

SHA-1 is widely used in applications like SSL, SSH, TLS, IPsec PGP, S/MIME to protect the sensitive information.

Google has demonstrated that SHA-1 Collision is possible and two files can have the same SHA-1 hash. This means that system can be manipulated by presenting it with manipulated data with same hash as good data.

man command in Linux and Unix

man command, short for manual, provides help for the commands, utilities or function in Linux and Unix systems. Learn about usage , related packages, sections and other interesting facts about man pages.

Submit Guest Posts

Great News, adminschoice.com is opening up to allow guest posts from bloggers and technical professionals.

If you are a tech blogger or a technical professional  wishing to share your experience and knowledge with others you can contribute to adminschoice.com and establish yourself as technical expert in your field.

Solaris 11 & Solaris 10 Certification

Learn about the Solaris 10 & 11 certification , price, number of questoons , duration and direct links to official site for exam 1z0-876, 1z0-821 and more.

Solaris Network Configuration

Learn Solaris Network configuration for static , dhcp & wifi in Solaris 11 using netadm and ipadmp. Earlier versions are covered towards the end of this document. Continue reading for Solaris 11 & for prior versions, please turn to Page 5 or click here

Download Linux : Top 10 Free Linux Distributions for Desktop and Servers

Here is the list of top 10 Linux distributions to free download latest version of linux operating system with links to linux documentation and home pages.
All the Linux distributions are either derivative of GNU/Linux ( OS made up of Linux Kernel developed by Linus Torvalds and GNU software repository) or derived from other Linux derivatives.

Top 10 Must have Books for Unix and Linux Administartors

Here is the top 10 must have books for system administartors who are starting working in Unix and Linux adminstration or current system administartors who want to improve skills and go deeper to learn and manage Unix and Linux systems.

10 Must Have O’Reilly Books for System Administrators

Published several years ago these O’Reilly books are still useful & relevant for the current and new system administratiors. Although these books may not cover latest version of operating systems yet these explains very well the underlaying technical details and process which have not changed over the years.

MongoDB Ransom Attacks Hit 27000 Systems

MongoDB Ransom Attacks has hit 27,000 Systems in few hours from 12000 impacted servers .

Most of the mongoDB installations are exposed to exploites due to poor default access controls for super users .

Hackers are accessing  MongoDB databaases and then copy and delete data from database running in default, unsecure configuration. In return of data administrators are being asked to pay ransom money by bitcoins.

What is Cloud Computing in Simplest Terms

Cloud Computing is the computing using resources – infrastructure or Software hosted on the internet either by a public cloud provider or hosted privately by local IT group of an organization.

awk Commands, Examples & Meaning

Learn to use awk for text and data extraction, data processing, validation,  generate reports for analysis, automation with with the help of examples of if else , compare & arrays plus regular expressions & built in operational variables, meaning, examples &command syntax.