Mustafizur stars in landmark series win- Bangladesh v India, 2nd ODI, Mirpur

216075Bangladesh 200 for 4 (Shakib 51*, Ashwin 1-32) beat India 200 in 45 overs (Dhawan 53, Mustafizur 6-43) by six wickets (D/L method)

Mustafizur Rahman was the hero in Mirpur again, (off)cutting through India’s batting with a six-wicket haul to add to his five-for on ODI debut, and launching Bangladesh to their first ever bilateral series win against India. Mustafizur’s 6 for 43, the second best figures by a Bangladesh bowler in ODIs, skittled India for 200, before Shakib Al Hasan steered the chase with a busy fifty, his second on the trot.

With this six-wicket win, Bangladesh also cemented their place in the 2017 Champions Trophy. An overjoyed Mashrafe Mortaza, who has been a part of each of Bangladesh’s five victories against India, toasted his team’s “big achievement”.

Why Bangladesh’s target was 200
When the rains came, India were already eight wickets down after 43.5 overs. Because the game was revised to 47 overs per side, India lost out on some batting opportunity, but that loss was minimal as they were already eight down at the time of the interruption. According to the DLS calculations, the batting resources denied to Bangladesh at the start of their innings, compared to what they would have had in a full 50-over innings, was marginally more than the resources India lost out on.

Continue reading “Mustafizur stars in landmark series win- Bangladesh v India, 2nd ODI, Mirpur” »


Pf vs Iptables- a Great comparative article

I enjoyed reading the following article, though would worth keeping a copy on my blog. Happy Reading-

Today I will be talking a lot about OpenBSD, FreeBSD and other Unix-like operating systems from the Berkeley Software Distribution. I thought that would be appropriate being my first document on Unixmen. I however will also be talking about Linux and Untangle and how they complement Unix based firewalls such as Pfsense.

I would like to explain what I think is the best way to secure a network from hackers and bots and why these techniques work as well as I say they do. I however will not be explaining how, as I will save that for another article. That being said if there is anything in error here please let me know but I am sure you will find nothing in contrast to common theory. I would also like to show you guys some things I like to do and things I think are critical to IT security. Continue reading “Pf vs Iptables- a Great comparative article” »


rkhunter perfect configuration


Exposing any computer to the internet is in some ways risky. There are many ways that your server can be compromised or attacked by remote systems and malicious software, and it is an ongoing and proactive process to defend yourself against potential threats.

One potential concern is rootkits. Rootkits are software secretly installed by a malicious intruder to allow that user continued access to the server once security is breached. This is an extremely dangerous problem, because even after the entry vector that the user originally used to gain access is fixed, they can continue to enter the server using the rootkit they installed.

One tool that can help you protect your system from these kinds of problems is rkhunter. This software checks your system against a database of known rootkits. Additionally, it can check other system files to make sure they are in line with expected properties and values.

In this guide, we will install and configure rkhunter to protect our Ubuntu 12.04 VPS. Continue reading “rkhunter perfect configuration” »


BD now member of Asia PKI Consortium

Bangladesh has been accepted as a member of the Asia PKI Consortium in its General Assembly (GA) Meeting held in Bangkok recently. The GA Meeting was chaired by Philip Leung, Chairman of Asia PKI Consortium and attended by member countries. The GA unanimously approved the membership of Bangladesh in the Asia PKI Consortium and expressed its interest to engage with Bangladesh in this complex field of technology, says a press release.

An international conference styled "The Common Denominators Collaboration of Cross-Region on E-Government Application, Cloud Computing and Security" was organised on the occasion in which large number international experts, companies took part Bangkok, Thailand recently. Ms Karen Chang, Office of Science and Technology, Executive YuanTaiwan and BAWG Chair along with Mr Shin Adachi, Dr Tschai Huei Jane and Mr Th Schee among others made presentations.

The Ministry of ICT of Thailand and Asia PKI Consortium (APKIC) were the hosts. The organiser of the event was Electronic Transaction Development Agency (ETDA) of Thailand, Business Case/Application Working Group (BAWG) of APKIC and Thailand PKI Association. Ms Suranghana Wayuparb, Chairperson of Thailand PKI Association & Vice Chair of APKIC Executive Director and CEO, ETDA along with Charamporn Jotikasthira, President of the Stock Exchange of Thailand and APKIC Chairman Philip Leung inaugurated the event. Continue reading “BD now member of Asia PKI Consortium” »


Miracle of Humankind- of the grace of Allah! Survivors after 17 days of building collapse

DHAKA, Bangladesh (AP) — A seamstress buried in the wreckage of a collapsed garment factory building for 17 days was rescued Friday, a miraculous moment set against a scene of unimaginable horror, where the death toll shot past 1,000.

Reshma survived, in remarkably good shape, by eating dried food that was in her area and drinking spare amounts of water with her. She was discovered on the second floor of the eight-story Rana Plaza building, where crews have been focused on recovering bodies, not rescuing survivors, for much of the past two weeks.

"I heard voices of the rescue workers for the past several days. I kept hitting the wreckage with sticks and rods just to attract their attention," she told the private Somoy TV from her hospital bed as doctors and nurses milled about, giving her saline and checking her condition.

"No one heard me. It was so bad for me. I never dreamed I'd see the daylight again," she said.

"There was some dried food around me. I ate the dried food for 15 days. The last two days I had nothing but water. I used to drink only a limited quantity of water to save it. I had some bottles of water around me," she said.

Once Reshma finally got their attention, the crews ordered the cranes and bulldozers to immediately stop work and used handsaws and welding and drilling equipment to cut through the iron rod and debris still trapping her. They gave her water, oxygen and saline as they worked to free her.

When Reshma was freed after 40 minutes, the crowd erupted in wild cheers. She was rushed to a military hospital in an ambulance, but her rescuers said she was in shockingly good condition, despite her ordeal.

Abdur Razzak, a warrant officer with the military's engineering department who first spotted her in the wreckage, said she could even walk.

"She was fine, no injuries. She was just trapped. The space was wide," said Lt. Col. Moyeen, an army official at the scene.

Reshma told her rescuers there were no more survivors in her area. Workers began tearing through the nearby rubble anyway, hoping to find another person alive. Continue reading “Miracle of Humankind- of the grace of Allah! Survivors after 17 days of building collapse” »


Creating a Windows Server 2008 R2 Failover Cluster

I hear you…you want your SQL, DHCP, Hyper-V or other services to be highly available for your clients or your internal users. They can be if you create a Windows Failover Cluster and configure those services in the cluster. By doing that if one of the servers crashes the other(s) one will take over, and users will never even notice. There are two types of Failover Clusters: active/active and active/passive. In the first one (active/active) all the applications or services running on the cluster can access the same resources at the same time, and in the second one the applications or services running on the cluster can access resources only from one node, the other one(s) is/are in stand-by in case the active node is fails.

Continue reading “Creating a Windows Server 2008 R2 Failover Cluster” »


Adjust Apache ServerLimit and MaxClient

MaxClients actually tells the apache to allow this many concurrent clients.

Normally this limit is at 150. You can change this limit by editing your httpd.conf file.

httpd.conf is normally located at /etc/httpd/conf/httpd.conf

nano /etc/httpd/conf/httpd.conf

ServerLimit directive to let the value of MaxClients above 256 work.
By deafult ServerLimit is 256 (and is usually not already there in httpd.conf). If it is in your httpd.conf increase it above 256 or if it is not there add it in your httpd.conf Continue reading “Adjust Apache ServerLimit and MaxClient” »


Paparazzi pops Princess Kate’s puppies

Well, this news interests me for many reasons, and I think this really who they are!!!

While enjoying a romantic getaway in France with William, the future Queen of England Kate Middleton decided to get her knockers out, only to be snapped by the awaiting paparazzi.
The Duke and Duchess of Cambridge (Kate and William to you and me) are said to be “saddened” by claims that a French magazine is publishing topless photographs of Kate. Harry, on the other hand, is probably only too delighted – as are we.
Last night the French version of the magazine Closer published pixelated images of Kate on a mock cover, but we've done some digging around and found this:

Princess Kate Naked



PKI Framework for Supporting the Security of Mobile Communication from its Core


1. Business areas into which e-commerce is continually expanding

In the past ten years within the computing world, the term "mobile computing" has become popular. And owing to the improved performance of mobile information terminals such as cell phones, notebook computers, and personal digital assistants (PDAs), the use of such devices has continued to spread into areas that were unthinkable ten years ago.

Taking the example of mobile phones, we can see that their display size has got bigger year on year, and it has now become a matter of course that internet web pages specially prepared for mobile-phone use can be viewed on these bigger displays. What's more, the entire business area of so-called "electronic commerce" (referred to as EC or e-commerce)–including mobile banking and mobile shopping–is continuing to expand.

More specifically, in the case of mobile banking, a mobile phone can be used for various banking services, such as balance enquiries, deposit and withdrawal enquiries, direct deposits, and money transfers. And in the case of mobile commerce, it can be used for such activities as enjoying shopping from "net catalog" schemes and selling one's things through "net auction" services.

Furthermore, to take the example of notebook PCs, it seems that these days internet environments called "hot spots" are appearing on every street corner, and they have created a situation in which users of notebook PCs can freely use the internet with the same sensation whether at home or at the office. Continue reading “PKI Framework for Supporting the Security of Mobile Communication from its Core” »


Dhaka to introduce digital signature

Bangladesh is set to introduce electronic signature, which is a key feature for e-procurement, e-governance, e-commerce and other digital activities, said officials in Dhaka yesterday.
“Electronic signature is ready for introduction and it will ensure the total security of electronic information,” Controller of the Certifying Authorities Mohamed Zahangir Alam said.
He said the electronic signature would uplift the image of country’s ICT sector across the world.
After the introduction of electronic signature, e-procurement, e-commerce, e-transaction, online income-tax return, online application for any kind of services and digital communication between government offices and NGOs will be facilitated, said Bangladesh Computer Council (BCC) assistant programmer Hasan-Uj-Jaman.
He said, it will also ensure Secure Socket Layer (SSL) based security to different kinds of servers such as web and mail and help to introduce paperless office and e-filing, and signing to electronic document and e-mail. Continue reading “Dhaka to introduce digital signature” »