Network Articles

Page 66 of 66

How To Setup SSH Access Without Password

karthikeya Boyini
karthikeya Boyini
Updated on 20-Jan-2020 917 Views

In this article, we will allow you to configure a password-less login for Linux system with SSH keys to connect to a remote Linux server without entering a password which will also increase the trust between two Linux servers for easy file transfer.SSH is an open source and trusted network protocol that is used to login into remote servers for executing of commands and programs. This is also used to transfer files from one computer to another computer over the network using secure copy (SCP).Creating SSH Keys# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to ...

Read More

Top 10 UNIX Command Line Mistakes

karthikeya Boyini
karthikeya Boyini
Updated on 17-Jan-2020 539 Views

As the saying goes – A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them. In IT world too mistakes are commonly done by new comers in the field due to inexperience. The Unix world is no different from the rest, and system admins unknowingly tend to commit some avoidable errors in their early days in the beginning of their career. Here are a few mistakes which are made by new system admins or users while working at UNIX prompt.This article explains the 10 most common Linux mistakes.userdel ...

Read More

Netdata – A Real-Time Performance Monitoring Tool for Linux Systems

Sharon Christine
Sharon Christine
Updated on 17-Jan-2020 568 Views

Netdata is an enormously optimized Linux utility that presents real-time (per 2nd) efficiency monitoring for Linux techniques, applications, SNMP devices, etc. And shows full interactive charts that certainly renders all collected values over the web browser to investigate them. This article explains about how to find a real-time performance monitoring tool for Linux Systems.FeaturesIt monitors total and per Core CPU usage, interrupts, softirqs and frequency.It monitors Memory, RAM, Swap and Kernel usage.It monitors Disk I/O (per disk: bandwidth, operations, backlog, utilisation, etc).It monitors Network interfaces including: bandwidth, packets, errors, drops, etc).It monitors Netfilter / iptables Linux firewall connections, events, errors, ...

Read More

How secure bitcoin currency is?

Prasanna Kotamraju
Prasanna Kotamraju
Updated on 30-Jul-2019 359 Views

From a connoisseur to a novice who deal in Bitcoin have a number of questions in terms of the security of this currency. However, they should not be worried because crypto is securer than existing currencies, banks, and other financial institutes.Thanks to Blockchain technology, which is backing it. Transactions are recorded in public, distributed ledger turn it more transparent and makes it even harder to temper it.However, cryptocurrency transactions and Blockchain ledgers do have a few security flaws, but they are not essentially the fault of the underlying technology. The structure of Bitcoin and its Blockchain means there are facets ...

Read More
Showing 651–654 of 654 articles
« Prev 1 62 63 64 65 66 Next »
Advertisements