Network Articles - Page 78 of 79

How To Configure and Set Up a Firewall on Ubuntu 16.04

Sharon Christine
Updated on 23-Jan-2020 07:47:45

2K+ Views

In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More

How To Configure and Secure SFTP Without Providing Shell Access on Ubuntu 16.04

Sharon Christine
Updated on 23-Jan-2020 07:34:09

347 Views

In this article, we will learn about how to configure SFTP without enabling the shell access on Ubuntu 14.04, SSH File Transfer Protocol (SFTP) which is a secure way to transfer files from various a servers are to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) which is supported by all the FTP clients.Protocol (SFTP) is a secure way to transfer files from various servers to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) that is supported by all the FTP clients.SFTP ... Read More

Learn How to Manage System Firewall using Iptables in Linux

karthikeya Boyini
Updated on 23-Jan-2020 05:50:52

431 Views

Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More

How To Setup SSH Access Without Password

karthikeya Boyini
Updated on 20-Jan-2020 11:53:18

863 Views

In this article, we will allow you to configure a password-less login for Linux system with SSH keys to connect to a remote Linux server without entering a password which will also increase the trust between two Linux servers for easy file transfer.SSH is an open source and trusted network protocol that is used to login into remote servers for executing of commands and programs. This is also used to transfer files from one computer to another computer over the network using secure copy (SCP).Creating SSH Keys# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to ... Read More

Top 10 UNIX Command Line Mistakes

karthikeya Boyini
Updated on 17-Jan-2020 11:24:36

454 Views

As the saying goes – A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them. In IT world too mistakes are commonly done by new comers in the field due to inexperience. The Unix world is no different from the rest, and system admins unknowingly tend to commit some avoidable errors in their early days in the beginning of their career. Here are a few mistakes which are made by new system admins or users while working at UNIX prompt.This article explains the 10 most common Linux mistakes.userdel ... Read More

Netdata – A Real-Time Performance Monitoring Tool for Linux Systems

Sharon Christine
Updated on 17-Jan-2020 10:41:38

513 Views

Netdata is an enormously optimized Linux utility that presents real-time (per 2nd) efficiency monitoring for Linux techniques, applications, SNMP devices, etc. And shows full interactive charts that certainly renders all collected values over the web browser to investigate them. This article explains about how to find a real-time performance monitoring tool for Linux Systems.FeaturesIt monitors total and per Core CPU usage, interrupts, softirqs and frequency.It monitors Memory, RAM, Swap and Kernel usage.It monitors Disk I/O (per disk: bandwidth, operations, backlog, utilisation, etc).It monitors Network interfaces including: bandwidth, packets, errors, drops, etc).It monitors Netfilter / iptables Linux firewall connections, events, errors, ... Read More

Difference between Internet and Intranet

Kiran Kumar Panigrahi
Updated on 27-Jul-2022 09:44:46

2K+ Views

The Internet is a global network of networks where computers communicate with each other via Internet Protocol. Intranets, on the other hand, are private networks. Go through this article to find out the other major differences between the Internet and an Intranet.What is Internet?The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.As the Internet is a globally connected network, so it can have multiple more users as compare to the number of users on Intranet.Although the phrases "Internet" and "World Wide Web" are sometimes used interchangeably, they are ... Read More

Difference between Cyber Security and Information Security

Mahesh Parahar
Updated on 24-Feb-2020 12:06:11

1K+ Views

Cyber Security and Information Security both terms are synonymous with each other the difference between the two comes when nature of data which is going to secure. In nutshell Cyber security deals with protecting networks, computers, and data from unauthorized electronic access while Information security deals with protecting information assets regardless of whether the information is in physical or digital format.Data security is all about securing data. But there is difference between data and information. Not every data can be information. Data can be called as information when it is interpreted in a context and given meaning. For example, “14041989″ ... Read More

Difference between Fixed Channel Allocations and Dynamic Channel Allocations.

Kiran Kumar Panigrahi
Updated on 22-Aug-2022 14:42:27

7K+ Views

Channel allocation techniques are used in radio resource management for wireless and cellular networks to distribute bandwidth and communication channels to base stations, access points, and terminal devices.The objective of channel allocation is to maximize system spectral efficiency in bits/s/Hz/site through frequency reuse while maintaining a high level of service by minimizing co-channel and neighboring channel interference among neighboring cells or networks that share the bandwidth.Channel allocation techniques can be grouped into two categories: Fixed Channel Allocation and Dynamic Channel Allocation.Read through this article to find out how these two channel allocation techniques are different from each other.What is Fixed ... Read More

Difference between Fuzzification and Defuzzification

Kiran Kumar Panigrahi
Updated on 21-Feb-2023 14:36:47

19K+ Views

Fuzzification is the process of converting a crisp quantity into a fuzzy quantity. On the other hand, defuzzification is the process of translating a fuzzy quantity into a crisp quantity. Read this article to learn more about fuzzification and defuzzification and how they are different from each other. What is Fuzzification? Fuzzification may be defined as the process of transforming a crisp set to a fuzzy set or a fuzzy set to fuzzier set. Basically, this operation translates accurate crisp input values into linguistic variables. In a number of engineering applications, it is necessary to defuzzify the result or rather "fuzzy ... Read More

Advertisements