Reading time: 2 minutes
As lots of system administrators have been in a situation where they misplaced their root passwords or confused Girlfriend’s birthday with it… Well, to some of us at least 🙂 Anyhow, just recently I happen to have got into an argument about whether to change the password on a monthly basis or less frequently. The…
Reading time: 9 minutes
What is bash Bash is a command language interpreter for the gnu based linux operating systems. Name itself stands for ‘Bourne-Again -SHell’, which was given as an honorable mention to Stephen Bourne, the author of the direct ancestor of the current unix shell sh. Bash is largely compatible with sh and incorporates useful features from Korn shell ksh and…
Reading time: 4 minutes
Are you authoritative enough? Let’s face it – Google dominates the digital advertising space real estate, and more and more businesses are turning away from other platforms in favor of Google Adwords (GA). And rightfully so, as Google puts great attention to detail when their marketing platform is concerned – anyone who ever read the Google…
Reading time: 4 minutes
I wanted to share interesting approach to storing sensitive data in DB where the same has to be encrypted and decrypted gracefully. I’d like to point out that there is a difference between sensitive data that needs to be stored for usage in plain form and sensitive data that needs no lain form presentation (passwords)….
Fill out the enquiry form and we'll get back to you as soon as possible.
Fill out the enquiry form and we'll get back to you as soon as possible.