- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 2065 Articles for Operating System
1K+ Views
The curl Delete task is an HTTP strategy that permits the evacuation of an indicated asset from a server. It is commonly used to Delete information or substances from a web service or API. The Delete request requires the URL of the asset to be Deleted, and extra headers or parameters can be included if required. When the server gets the Delete ask, it forms the ask and Deletes the desired asset in the event that it exists. An effective Delete request ordinarily comes about in an HTTP status code demonstrating the fruitful cancellation of the asset. Curl, a command-line ... Read More
36 Views
To secure SSH, begin by altering the default SSH port to a non-standard one, employing a solid secret word or key-based verification, and debilitating root login. Furthermore, execute firewall rules to permit only trusted IP addresses to associate. Another option is to set the hostname to an interesting and identifiable title to organise administration. At last, empower fundamental arrangement administrations such as firewalls, interruption discovery frameworks, and programmed security upgrades to guarantee continuous security. These measures altogether improve the security of the SSH server, making it less vulnerable to unauthorised access and potential assaults. Methods Used Normal approach ... Read More
124 Views
Secure ProFTPD Associations Utilising the TLS/SSL Convention on RHEL/CentOS 7 includes executing Transport Layer Security (TLS) and Secure Attachment Layer (SSL) encryption for secure information transmission over ProFTPD, a well-known FTP server programme. By designing ProFTPD to utilise TLS or SSL, the communication between the FTP client and server is scrambled, guaranteeing privacy and judgement of the information being exchanged. This security degree secures touchy data, such as login qualifications, from being accessed or altered by unauthorised people. TLS/SSL certificates are used to set up secure associations and confirm the server, building trust between the client and the FTP server. ... Read More
453 Views
Abstract Users can communicate with the system through an interface known as a GUI, or graphic user interface. Operating a GUI is a rather simple process. The activities are performed in the interface and are used as input before being delivered as a command to the system, which eventually ends the work. Working of Linux GUI A graphical user interface (GUI) is a way for users to communicate visually with a computer system using windows, icons, or images. The operating system's kernel is its beating heart, while the graphical user interface provided by the X Window System, also referred to ... Read More
102 Views
ACLs (Access Control Lists) in Linux give an adaptable and granular way to secure records and catalogues. With ACLs, authorizations can be set for individuals, clients, and bunches beyond the conventional proprietor, bunch, and others. This permits fine-grained control over access rights. By utilising commands like "setfacl" and "getfacl, " chairmen can characterise particular consents, such as perused, typed in, and executed, for numerous clients or bunches at the same time. ACLs upgrade security by empowering chairmen to confine or allow access to particular assets, guaranteeing that, as it were, authorised people or bunches can connect with touchy records and ... Read More
65 Views
Following the system's interpretation of each command, a separate process is established to carry out the command. This new process is assigned a distinct process identification number (PID). To keep track of each process's current state, the system uses the PID. Note − Linux commands are case-sensitive. Process Table The process table in Linux is just a data structure in a computer's RAM like it is in almost every other operating system. It contains details about the processes that the OS is currently managing. This data contains broad details about each procedure. Process Id Process Owner Process Priority Environment ... Read More
240 Views
Abstract Disk monitoring is an important task to perform while maintaining a linux system. Essentially, getting data back from the disk costs time. As a result, the disk I/O subsystem is considered the slowest part and can slow down the whole system. Checking disc performance is crucial as a result. We must determine which process is waiting for the I/O request to complete and determine whether there is a bottleneck and what is causing it. To examine the disc I/O performance in Linux systems, we'll learn how to use tools like iostat, iotop.. iotop installation in Linux It is readily ... Read More
138 Views
To secure Apache with a Let's Encrypt certificate on Rough Linux, directors can guarantee secure communication over HTTPS. By getting and introducing a Let's encrypt certificate, Apache can encrypt information transmission, upgrading security and ensuring delicate data. This preparation includes designing Apache to utilise the certificate, empowering HTTPS for the site, and guaranteeing that all communication between the server and clients is encrypted. Let's encrypt certificates that are trusted by major browsers, giving a cost-effective and broadly recognised arrangement for securing Apache web servers on Rough Linux. Methods Used Obtaining a let’s encrypt certificate Configuring Apache Obtaining a ... Read More
5K+ Views
In Linux, it is often necessary to find out the most recently modified files for various reasons, such as troubleshooting or auditing purposes. Listing the last five modified files is a common requirement that can be achieved using various Linux commands. In this article, we will explore some of the methods to list the last five modified files in Linux. Note − Linux commands are case-sensitive. Using ls Command The ls command is one of the most commonly used commands in Linux to list files and directories. We can use the ls command to list the files in a directory ... Read More
140 Views
Scrot is a command-line device in Linux that empowers clients to capture desktop or server screenshots. By executing basic commands, clients can take screenshots of their whole desktop or particular districts with exact control. Scrot offers different alternatives for capturing screenshots, such as setting a delay for some time recently captured, selecting the yield record organisation, and indicating the capacity area. With its ease of use and adaptability, Scrot streamlines the method of taking screenshots in Linux, whether for documentation, investigating, or sharing visual data. It gives a helpful and effective way to capture and spare screen pictures straightforwardly from ... Read More
To Continue Learning Please Login
Login with Google