Operating System Articles

Page 76 of 171

Windows UAC protection Bypass

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 444 Views

User Account Control (UAC) is a Windows security feature that prevents unauthorized changes to the system by requiring administrator-level permissions for certain operations. It acts as a barrier between standard user accounts and administrative functions, prompting users to confirm or provide credentials when attempting to perform tasks that could affect system security or stability. UAC is designed to reduce the attack surface by ensuring that even users with administrator accounts run most applications with standard user privileges. When administrative access is needed, UAC displays a prompt requiring explicit consent or credentials. Understanding UAC Bypass Techniques This tutorial ...

Read More

Run Linux Natively on Windows 10

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 566 Views

Microsoft has introduced the Windows Subsystem for Linux (WSL), which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. This feature bridges the gap between Windows and Linux environments, allowing developers and system administrators to use Linux tools natively on Windows. Limitations of Windows Subsystem for Linux While WSL is a significant step forward for Microsoft, it has some limitations in terms of full functionality. Specifically, WSL does not support AF_PACKET due to security restrictions. This means you won't be able to put a Wi-Fi adapter in promiscuous mode ...

Read More

Difference between Fedora and Red Hat

Mahesh Parahar
Mahesh Parahar
Updated on 17-Mar-2026 1K+ Views

Fedora and Red Hat Enterprise Linux (RHEL) are both Linux-based operating systems from the Red Hat ecosystem. Fedora is the free, community-driven distribution that serves as a testing ground for new technologies, while RHEL is the commercial, enterprise-grade distribution built for production environments. Fedora vs Red Hat Enterprise Linux Fedora • Free & Open Source • 6-month releases • Latest packages • Community support • Testing ground Red Hat (RHEL) • Commercial license ...

Read More

Working with tmux session

sudhir sharma
sudhir sharma
Updated on 17-Mar-2026 483 Views

Tmux is a terminal multiplexer for Unix-based operating systems that enables multiple terminal sessions within a single window. It is particularly valuable when working with cloud-based services like AWS or Azure, allowing users to create separate terminal sessions for different tasks or remote users while maintaining persistent connections. When working with web services, you often need to create an EC2 instance on a web server and establish a session to work remotely. Tmux ensures that your work continues even if your connection drops, as sessions remain active on the server. Getting Started with AWS EC2 Here are ...

Read More

Cover the Tracks using covermyass

Ajay yadav
Ajay yadav
Updated on 17-Mar-2026 418 Views

CoverMyAss is a penetration testing tool designed for the "covering tracks" phase of security assessments. It helps security professionals clean up evidence of their activities on target systems before exiting, or disable system logs for post-exploitation analysis. This tool is essential for ethical hackers and penetration testers who need to simulate real-world attack scenarios. How CoverMyAss Works The tool operates by systematically clearing or manipulating various system log files that record user activities, authentication attempts, and system events. It targets critical log files where evidence of unauthorized access might be stored, ensuring a thorough cleanup process. Target ...

Read More

Top tips to manage docker containers from command line

Raunak Jain
Raunak Jain
Updated on 17-Mar-2026 368 Views

Docker has become the standard for containerization, with organizations rapidly adopting container-based architectures. Managing multiple containers and images through the command line interface (CLI) can seem overwhelming, but with the right set of commands and techniques, it becomes straightforward and efficient. This article covers essential tips and commands for managing Docker containers and images from the command line, helping you streamline your container operations and save valuable time. Listing Images and Containers Keeping track of your Docker resources is crucial for effective management. Use these commands to view your current images and containers. List All Images ...

Read More

Best practices for writing a Dockerfile

Raunak Jain
Raunak Jain
Updated on 17-Mar-2026 414 Views

A Dockerfile is a text document containing instructions to build a container image. It allows developers to create reproducible execution environments and automate the deployment process. Writing an efficient Dockerfile is crucial for project performance, especially when deploying at scale. Docker images follow a layered architecture where each instruction creates a new layer. This design enables image reuse, efficient disk storage utilization, and caching during the build process. Understanding this layered structure is key to optimizing your Dockerfile. Docker Image Layer Structure Application Layer ...

Read More

Using .Dockerignore file

Raunak Jain
Raunak Jain
Updated on 17-Mar-2026 5K+ Views

We know that we can run our docker images on cloud services which provide high computations at low cost. However, one might wonder why we need to optimize a docker image. Think of a situation where you have copied a large file in your docker container that you actually don't need. It will obviously increase the size of the docker image, increase the overall build time, and cause caching issues. So, why not use a simple technique to avoid all these issues and improve the overall performance of the docker build process. What is a .dockerignore file? Similar ...

Read More

Running GUI applications on docker in linux

Raunak Jain
Raunak Jain
Updated on 17-Mar-2026 663 Views

Running GUI applications inside Docker containers requires connecting the container's display output to the host system's display server. By default, Docker containers cannot access the host's display, making it impossible to run graphical applications. This article demonstrates how to configure Docker containers to run GUI applications like Firefox by forwarding X11 sockets and managing display permissions. X11 Display Forwarding The X11 display server handles graphical output on Linux systems. To run GUI applications in Docker, we need to: Forward the X11 socket to the container Set the DISPLAY environment variable Configure X server authentication permissions ...

Read More

RUN vs CMD vs Entrypoint in Docker

Raunak Jain
Raunak Jain
Updated on 17-Mar-2026 5K+ Views

The commands RUN, CMD, and ENTRYPOINT usually cause a lot of confusion among Docker developers. Understanding all three commands conceptually will help to have a clearer understanding of Docker image building and container execution. When we try to build an image using a Dockerfile, the instructions are executed step by step. The first instruction is usually pulling a base image such as an OS distribution like Ubuntu or CentOS. After that, we modify the base image either by including more images using FROM and AS commands or by modifying the images. Every such instruction creates a new intermediate image ...

Read More
Showing 751–760 of 1,707 articles
« Prev 1 74 75 76 77 78 171 Next »
Advertisements