Author Archives: iamnandans

Distributed System

I have viewed all 24 lectures (link below) of “Distributed Systems” by Prof. Keshav, Waterloo University and would recommend all who are interested in the system to listen too. Each of the lecture comes with bundle of information. Prof co-relates … Continue reading

Posted in Unix and Unix Internals | Leave a comment

Java Collections comparision

If you are looking for comparing various java collections, here it goes Source: https://zeroturnaround.com/rebellabs/java-collections-cheat-sheet/

Posted in Java | Leave a comment

RPO and RTO

Recovery Point Objective (RPO) refers to the amount of data at risk. It’s determined by the amount of time between data protection events and reflects the amount of data that potentially could be lost during a disaster recovery. The metric … Continue reading

Posted in Backup and Recovery | Leave a comment

God’s Own Kitchen by Rashmi Bansal

I had read two other books from Rashmi Bansal which i had liked. Based on my opinion about previous books, read this book too and i was not disappointed. Book is about “Akshaya Patra” program by ISCON temple. For all … Continue reading

Posted in General Books | Leave a comment

OS command injection/remote command execution

Following are few examples of OS command injection/remote command execution Eg#1 /* following program mimics cat command in unix which prints the content of file */ #include #include #include #include int main(int argc, char **argv) { char cat[] = “cat … Continue reading

Posted in C Section, General Tech Discussion | Leave a comment

Application Security

Application security Applications deployed are vulnerable to various kind of attacks from hackers. As such when applications are designed/coded, care should be taken to avoid any such attacks. QA team should also consider writing test cases to validate for any … Continue reading

Posted in C Section, General Tech Discussion | Leave a comment

Sticky bit

Sticky bit on files Sticky bit can be set on files for faster loading of program which in turn reduces the delay in execution of the binary. When a process executes a file that has its sticky bit set, the … Continue reading

Posted in Unix and Unix Internals | Leave a comment