Linux Articles

Page 96 of 134

How to Generate & Set Up SSH Keys on CentOS 7?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

SSH keys are cryptographic key pairs that provide a secure authentication method for connecting to remote servers. Unlike traditional password-based authentication, SSH keys offer enhanced security by using public-key cryptography. The private key remains on your local machine, while the public key is placed on remote servers you want to access. SSH keys eliminate the risk of password-based attacks and provide a more convenient way to authenticate, especially when managing multiple servers. CentOS 7 includes all the necessary tools to generate and manage SSH keys out of the box. Generating SSH Keys on CentOS 7 Basic SSH ...

Read More

How to Generate & Set Up SSH Keys on Debian 10?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

In today's world, where most communication and data transfer happens over networks and the internet, security has become a crucial issue. An unsecured network can allow malicious users to intercept, modify, or steal sensitive data. To ensure secure communication over a network, encryption plays an essential role. Secure Shell (SSH) is an encrypted protocol that allows you to access a remote system securely. It provides secure communication between two untrusted hosts over an insecure network. SSH keys are authentication credentials used by SSH for secure communication between systems. They provide a more secure way of logging into a ...

Read More

How to Generate a Certificate Signing Request (CSR) With OpenSSL?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

A Certificate Signing Request (CSR) is a digital document containing information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and identifying information such as organization name, domain, and location. This information enables a Certificate Authority (CA) to verify the requester's identity and issue a valid SSL/TLS certificate. The CSR is essential for obtaining SSL/TLS certificates because it provides the verification mechanism for domain ownership and organizational identity. Without a properly generated CSR, you cannot secure your website with encryption. Understanding OpenSSL and Its Components OpenSSL is an open-source cryptographic toolkit that provides ...

Read More

How to Generate a Self-Signed Certificate for Kubernetes?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 954 Views

Self-signed certificates provide a cost-effective way to establish secure communication between Kubernetes components such as the API server, etcd, and kubelets. While not signed by a trusted Certificate Authority (CA), they offer encryption for internal cluster communication and development environments. What are Self-Signed Certificates? A self-signed certificate is a digital certificate that is signed by its own private key rather than by a trusted Certificate Authority. In Kubernetes, these certificates secure communication channels between cluster components, ensuring data integrity and confidentiality during transmission. Generating a Self-Signed Certificate Step 1: Generate a Private Key First, create ...

Read More

How to Generate SSH Keys on Ubuntu?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 17K+ Views

SSH keys are cryptographic security keys that provide a more secure authentication method than passwords when connecting to remote servers. Ubuntu makes it easy to generate SSH key pairs using the ssh-keygen command-line tool. This guide will walk you through generating SSH keys on Ubuntu, understanding the different key types, and adding your public key to remote servers for secure authentication. The Benefits of Using SSH Keys over Passwords SSH keys offer significant security advantages over traditional password authentication: Enhanced Security − SSH keys use cryptographic algorithms that are nearly impossible to crack without access ...

Read More

How To Get Helm Logs Of Changed Helm Releases?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

Helm is a powerful Kubernetes package manager that simplifies deployment and management of applications through versioned releases called charts. When working with Helm releases, tracking changes is crucial for debugging, compliance, and maintaining deployment stability. Helm logs provide visibility into release history, helping you understand what changed between deployments and troubleshoot issues effectively. This guide covers how to retrieve and analyze Helm logs for changed releases, enabling better monitoring and management of your Kubernetes deployments. Understanding Helm Releases A Helm release is a versioned instance of a chart deployed to your Kubernetes cluster. Each release has a ...

Read More

How to Get Root and User SSH Login Email Alerts?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

Secure Shell (SSH) is a widely used protocol for securely connecting to remote systems over unsecured networks. It provides a secure channel for communication between two systems, allowing users to execute commands and manage files on remote machines without the risk of eavesdropping, tampering, or identity theft. However, despite its strong security features, SSH is still vulnerable to attacks from cybercriminals who seek to exploit weak passwords, unpatched software vulnerabilities, or misconfigured permissions. Therefore, it's essential to take proactive measures to secure your SSH access by implementing email alerts for login attempts. Setting up Email Alerts for Root ...

Read More

How to Get the Size of a Directory in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 29K+ Views

In Linux, managing disk space effectively requires knowing how to determine directory sizes. A directory in Linux is similar to a folder in other operating systems, organizing files and subdirectories in a hierarchical structure. Directories are treated as files themselves, having attributes, permissions, and metadata such as creation and modification times. Understanding directory sizes helps system administrators monitor disk usage, identify space-consuming files, and maintain optimal system performance. This article explores three practical methods to get directory sizes in Linux. Method 1: Using the "du" Command The "du" command stands for "disk usage" and is the most ...

Read More

How to Git Stash Specific Files?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 13K+ Views

Git is a popular version control system used by developers to track changes in their codebase. Git Stash is a feature that allows developers to temporarily save changes they have made to their working directory, without committing them to the repository. This feature is useful when developers need to switch to a different branch or work on another feature, but don't want to commit untested changes. When using Git Stash, all changes in the working directory are saved as a "stash" which can be retrieved later. This allows developers to work on multiple features simultaneously without having unfinished or ...

Read More

How to Grep for Multiple Strings, Patterns or Words?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Grep is one of the most powerful and widely used command-line tools in Linux/Unix systems. It stands for "Global Regular Expression Print" and is used for searching text files or output of commands for specific patterns or strings. It can search through an entire directory structure, filter results, and display only relevant data. Grep is versatile for system administration, programming, and data analysis tasks. Basic Grep Commands Grep is a command-line tool used in Unix-based operating systems to search for specific patterns or strings in files or command output. The basic syntax is − grep [options] ...

Read More
Showing 951–960 of 1,338 articles
« Prev 1 94 95 96 97 98 134 Next »
Advertisements