This article will look at a problem with the network namespace file in a Docker container. We'll examine why the network namespace file is invisible to the ip netns ls command. Before moving ahead, let's have a brief overview of Docker, Containers and Network Namespace Containerization Containerization is similar to virtualization, in which an application and all its dependencies and libraries are packaged into a single container; it can run in any computing environment. When the OS kernel and all necessary libraries and dependencies are included in the container, anyone working on the application can use only the container to ... Read More
Introduction cURL (Client URL) is a command-line tool. It allows data to be transferred to or from a server without requiring user interaction by utilising the supported libcurl library. cURL can also be used to troubleshoot network connections. In some cases, we may need to send requests that bypass the cache and generate a new response from the server. Caching can occur on the client side (browser cache) or the server side. When using the cURL command, remember that it is only an HTTP client and does not cache any requests on the client side. As a result, any caching ... Read More
Introduction Hexdump shows the binary file contents in hexadecimal, decimal, octal, or ASCII form. It is an inspection tool that is also useful for programming, reverse engineering, and data recovery. It represents the content of a file in hexadecimal form. The various tools we can use to generate a file's hex dump will be covered in this article. We will learn to create a hex dump of a file. To utilise as a model for this article, let's generate an ASCII text file. $ cat >> example.txt This is our sample text in the file. We will convert it ... Read More
Introduction If a numbering system is represented in base 16 then it is considered to be hexadecimal. In this article we will understand to convert Hex to ASCII in the Linux Shell. The hexadecimal system uses a combination of digits and alphabetic characters, and it looks like this −0 1 2 3 4 5 6 7 8 9 A B C D E F Large digital systems are best suited for a hexadecimal numbering system since it can store and express long binary data. Because a total of 16 symbols (both digital and alphabetic, ranging from 0 to F) ... Read More
In this tutorial, we will learn to fix broken images automatically in jQuery. Have you ever seen broken images while wondering on any website which shows only alternative text with the default icon of the broken image? Don’t you think it is a bad user experience? Obviously, it is. So, when you develop the application or website, you should write some JavaScript or jQuery code such that it can automatically replace broken images. Here, we will learn 2 to 3 different methods to fix broken images automatically using jQuery. Use the ‘onerror’ event inside the HTML ‘ ’ tag ... Read More
When someone "cuts the cord", they give up the traditional cable TV service and instead opt for streaming services. It is a trend that began to gain momentum in 2008 and has since covered about half the population. Cable TV is reaching a point where it might soon be extinct as an increasing number of individuals cut the cord every day. Reasons for cord cutting Pricing Streaming Platforms offer very competitive monthly pricing for the value they provide. They can afford to do so because they have millions of users worldwide, while cable TV operators would be somewhat geographically restricted. ... Read More
Database Administration (DBA) has always been one of the most sought after skills over the years. In recent times, however, the DBA environment has drastically changed as companies are moving towards cloud computing. To understand Cloud Database Management, we first need to define what it means. What is Cloud Database? A database service that is created and accessed through a cloud platform is known as a cloud database. Traditional databases' capability is comparable to that of cloud databases, but the flexibility of the database is significantly greater. What is Cloud Database Management? The process/system of performing management actions on the ... Read More
Introduction Cloud storage is a computing service paradigm that allows a user to access data stored in a remote location at any point in time on any device through the internet. As we see more and more companies shifting towards the cloud, they also have their own set of requirements and needs they use the cloud for. Depending on these needs, the cloud is divided typically into Private Cloud and Public Cloud. To understand the differences between private and public clouds, we first need to understand what they are and what they offer. What is Public Cloud? Essentially, public cloud ... Read More
More and more healthcare organizations are turning to outside contractors for assistance in managing the enormous amounts of Protected Health Information (PHI) produced by healthcare operations. Concerns about the security and privacy of sensitive patient data are rising as recent hacks and data breaches have reached frightening dimensions. Strong BAAs should be implemented to guarantee security, privacy, and compliance to combat this threat. Any third-party service provider who has access to PHI must sign a BAA with a covered entity to comply with HIPAA regulations. What is the HIPAA BAA? A HIPAA Business Associate Agreement (BAA) is a contract that ... Read More
Utilizing cloud hosting and cloud resources makes websites and apps available to us. When we talk about using only one server as an alternative, the hosting does not install solutions at all. Instead, the program or website is hosted by a network of linked physical and virtual cloud servers, providing more flexibility and scalability. Considerations in Cloud Hosting Security − Customers should take into account a supplier with choices for physical/operational, network and system, application, and data security. Sensitive Information − Businesses that handle sensitive data may want to adopt dedicated servers, hardware segregation, or other solutions. Support − ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP