Random

SEO Tips for Business Success

SEO Tips for Business Success

Being a founder of multiple failed startups, I always tried to find a way of cheap advertising techniques to get results with minimum investment. In this struggle, one day I came across Search Engine Optimization (SEO) platform and I can confidently say it changed my life. The moment, I became convinced that how much powerful SEO is in the world of advertising, I didn’t waste any time and started learning it right away. I implemented it on my website. And after years of trying SEO techniques on my website, I became expert at it. Here, I want to share the…
Read More
Tips for Startup Success and Growth

Tips for Startup Success and Growth

For your startup to be successful unicorn, all you need is a great idea, certified by your best friend’s enthusiasm and the rest will take care of itself. Although you will have to work, but there are always shortcuts, and the billion-dollar exit is just a meeting away. For help & insight, find a big-name chairman who travels the world for a dozen boards, because he won’t get caught up in all the details of your business. Those emails he’s reading during your board meetings are with very important people who could help with an IPO. The critical thing is…
Read More
ELK Stack – Upgrade from 2.x to 5.x

ELK Stack – Upgrade from 2.x to 5.x

Elasticsearch Snapshot and Restore https://www.elastic.co/guide/en/elasticsearch/reference/current/modules-snapshots.html   Elasticsearch Migration Helper Plugin cd /usr/share/elasticsearch/ ./bin/plugin install https://github.com/elastic/elasticsearch-migration/releases/download/v2.0.4/elasticsearch-migration-2.0.4.zip you may get updated command from here -> Elasticsearch Migration Plugin Install You may download plugin from here -> Elasticsearch Migration Plugin After plugin install, access plugin using URL http://elasticsearch_ip:9200/_plugin/elasticsearch-migration/ netstat -na | egrep '9200|9300' vi /etc/elasticsearch/elasticsearch.yml network.host: localhost      to       network.host: "0"   If we have error for file descriptors. Elasticsearch uses a lot of file descriptors or file handles. Running out of file descriptors can be disastrous and will most probably lead to data loss. Make sure to increase the limit…
Read More

Top 10 In-Demand Skills To Help You Get Hired

Python One of the top most advertised software skills. Listed among the highly scarce skills in the software industry. Heavily used in prime industries including Big Data, Data Analytics, and Data Mining. One of the most in-demand skills with a vast number of job opportunities internationally. Data Analytics Data Science and Statistics seem to make way in every workforce possible. Big players from top sectors like banking and healthcare rely heavily on data for their business decisions. Data Analytics has become one of the most commonly cited skills in the last few years. Caregiving With an increase in global healthcare…
Read More
Get rid of these bad habits to become a better co-worker

Get rid of these bad habits to become a better co-worker

Many top performers at their companies suck at managing or leading. That’s because the same competitive drive that led them to the top can also cause an all-out war with peers. This article "Get rid of these bad habits to become a better co-worker" is to list those habits. In the book What Got You Here Won’t Get You There, top executive coach Marshall Goldsmith breaks down the bad habits that are stopping many people from climbing higher in their careers. 1. An overwhelming need to win. Even the trivial stuff. Your desire to win made you successful. However, you run the…
Read More
A Guide to Shipping Container Dimensions

A Guide to Shipping Container Dimensions

The shipping and maritime sectors are under a transformation. From digitisation to stringent environmental protection laws to changing container dimensions, new technologies, amendments, regulations etc. are continuously being added to the industry. One of the most significant transformations in the history of shipping and the maritime sector was when the first cargo container was introduced to drastically reduce the transportation of products. Today, different container dimensions are used depending on the type of cargo. Related Reading: History of Containerization As of today, more than 17 million containers of different dimensions and types are used globally to make container shipping the most…
Read More
Dynamics Wallet Card – Credit card with display and cell phone connection

Dynamics Wallet Card – Credit card with display and cell phone connection

Credits cards and debit cards have chips in them to ward off fraud. But Dynamics is introducing a new Wallet Card today that can run circles around that technology. The Wallet Card has the support of a consortium of financial companies, including MasterCard, which led the last financing round for Pittsburgh, Pennsylvania-based Dynamics. The Wallet Card has a cell phone chip and most of the working parts of a computer, including a display — all inside a piece of plastic that looks like any other credit card. Dynamics is showing the Wallet Card at CES 2018, the big tech trade show in Las Vegas…
Read More

Asterisk Server Security – SIP security

If your SIP server is exposed to internet. Then you need to take some measure even if you have fail2ban installed. Fail2Ban keep track of the logs while blocking the attacks and some of the attacks might occur while fail2ban start jump into it. Following are the Tools used for that; sipsak sipvicious iWar sip-scan sipcli friendly-scanner VaxSIPUserAgent sundayddr you can block these attacks by using IP Tables. Following is the example for one the attack to block; iptables -I INPUT -j DROP -p udp –dport 5060 -m string –string "sip-scan" –algo bm Ref: Haroon Javed
Read More
netstat – Find number of active connections in Linux using netstat

netstat – Find number of active connections in Linux using netstat

The "netstat" command is quite useful for checking connections to your machine. If we wanted to see ALL of the connections (which i really recommend you don't do unless you're trying to debug something and then you should probably pipe it to a file) we could use the "netstat -a" command. Using "netstat -a" will give you something like this:   tcp 0 0 app.mydomain.com:http 93.184.216.119:16494 SYN_RECV tcp 0 0 app.mydomain.com:http 93.184.216.119:18733 SYN_RECV tcp 0 0 app.mydomain.com:http 93.184.216.119.dsl.mwe:64775 SYN_RECV tcp 0 0 app.mydomain.com:http 93.184.216.119.threembb.:16490 SYN_RECV tcp 0 0 app.mydomain.com:http 93.184.216.119:video-activmail SYN_RECV tcp 0 0 app.mydomain.com:http 93.184.216.119:45025 SYN_RECV tcp 0 0…
Read More
Meltdown and Spectre – What you need to know about these serious chip flaws

Meltdown and Spectre – What you need to know about these serious chip flaws

Every computer has a central processing unit, or CPU. It’s the main brain that does most of the “thinking” in a digital device. And two new flaws have been discovered that can allow an attacker to grab the data that’s being crunched inside the chip. The flaws, known as Meltdown and Spectre, together impact most of the computing devices on the planet. Meltdown is a flaw that affects processors made by Intel. The Spectre flaw, the more serious of the two, affects Intel, AMD and ARM processors. Do you need to be worried? You bet. While the researchers at Google who discovered the…
Read More