Author: Mike

Milind Koyande loves to work on new technologies specially virtualization and troubleshoot server problems. I’m an avid photographer and love to spend my free time close to nature, trying to capture its glory on my camera.

WonderFox DVD Ripper Pro Giveaway

GIVEAWAY !! WonderFox DVD Ripper Pro Giveaway!! eITWebguru is happy to announce you our first giveaway for awesome application “WonderFox DVD Ripper Pro” worth $49.95 for free !! YES for FREE. “WonderFox DVD Ripper Pro” DVD ripping tool (Fastest as it takes about only 20 minutes to rip a 150 minutes) that provides the quick solution to
Read More »

Manage the Surge In Unstructured Data [Infographic]

Massive amounts of new digital information are flooding enterprise networks everyday. A powerful transformation is happening. People and machines are interacting with each other differently over networks. All information today is unstructured data. A massive surge in unstructured data creates tough challenges for IT. Businesses need more intelligent network infrastructure to support their Big Data
Read More »

Reliance Freenet: Why Shouldn’t the Internet be Free?

Internet.org Free Internet service with Reliance According to the report  ‘Mobile Internet in India 2014’ released by Internet & Mobile Association of India (IAMAI) and IMRB International, there were 173 million users in India have access to mobile internet till December, 2014. This figure is expected to grow to 53 million i.e. near about 213
Read More »

A boon for online buyers- GOSF

GOSF : Great online shopping festival  Do you like to shop for hours without getting tired? Are you an online buyer? Do you look up to discounts? I know what is going on in your mind. Thinking of some shopping festival, right? So let me announce it royally to you the start of Great online
Read More »

CVE-2014-7169 BASH Vulnerability for Linux & How to fix it

CVE-2014-7169: BASH Vulnerability Affecting Linux & OS X Systems What is CVE-2014-7169 GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the
Read More »

Introduction to Cloud Computing [Presentation]

Introduction to Cloud Computing My previous article “Understanding Cloud Computing: Explain to me like I’m five” explains the cloud concept in very simple way so that everyone who doesn’t know anything about it can have a basic understanding about it. Now, I am writing this article to take the next step to understand the cloud
Read More »