Found 1383 Articles for Open Source

How to Get Total Inodes of Root Partition?

Satish Kumar
Updated on 06-Jun-2023 16:39:47

581 Views

Introduction Before we dive into the topic of how to get total inodes of root partition, let's start with understanding what inodes actually are. Inodes, short for Index Nodes, is a data structure used by the file system to store information about files and directories. Every file or directory on a Unix-based system has an inode associated with it, which contains metadata such as permissions, timestamps, and other attributes. In simple terms, an inode acts as a pointer to where data is stored on the hard drive. It is worth noting that unlike file names or directory names which ... Read More

How to Get the Size of a Directory in Linux?

Satish Kumar
Updated on 06-Jun-2023 16:38:00

27K+ Views

Introduction In the Linux operating system, a directory is similar to a folder in other operating systems. It's a way to organize files and other directories, which helps the user easily locate and access them. Directories can be nested within each other, creating a hierarchical structure that can be several levels deep. One important feature of directories in Linux is that they are treated as files themselves. This means that they have attributes and permissions, just like any other file. Directories also contain metadata such as creation time and last modified time. Method 1: Using the "du" Command Explanation of ... Read More

How to Get Root and User SSH Login Email Alerts?

Satish Kumar
Updated on 06-Jun-2023 16:35:47

891 Views

Introduction Secure Shell (SSH) is a widely used protocol for securely connecting to remote systems over unsecured networks. It provides a secure channel for communication between two systems, allowing users to execute commands and manage files on remote machines without the risk of eavesdropping, tampering, or identity theft. However, despite its strong security features, SSH is still vulnerable to attacks from cybercriminals who seek to exploit weak passwords, unpatched software vulnerabilities, or misconfigured permissions. Therefore, it's essential to take proactive measures in order to secure your SSH access. Setting up Email Alerts for Root Login Exploring the Necessary ... Read More

How To Get Helm Logs Of Changed Helm Releases?

Satish Kumar
Updated on 06-Jun-2023 16:33:26

3K+ Views

Introduction Helm is a well-known Kubernetes package manager and an open-source tool used to streamline the installation, upgrading, and management of Kubernetes applications. With Helm, users can create version-controlled application releases that are easy to reproduce and manage. The tool simplifies deployment by allowing developers to package their applications as charts that can be easily deployed on any Kubernetes cluster. Keeping track of changes made to releases is paramount in ensuring a smooth and efficient deployment process. That's where Helm logs come into play. Logging release changes with Helm helps you understand what has changed between releases, identify ... Read More

How to Generate SSH Keys on Ubuntu?

Satish Kumar
Updated on 06-Jun-2023 16:31:12

14K+ Views

Introduction In this article, we will focus on how to generate SSH keys on Ubuntu - one of the most popular Linux distributions used by developers worldwide. We will provide step-by-step instructions for generating an SSH key pair using both command line interface (CLI) and GUI tools like FileZilla. The article will also cover common issues that users may encounter when generating or using their SSH keys on Ubuntu along with troubleshooting tips and solutions for each issue. Whether you're a developer looking for secure access to remote servers or a system administrator tasked with maintaining security at scale, ... Read More

How to Generate SSH Key in Windows 10?

Satish Kumar
Updated on 06-Jun-2023 16:29:39

357 Views

Introduction SSH, short for Secure Shell, is an encryption protocol that provides a secure connection between two computers over an insecure network, such as the internet. It allows users to remotely and securely access and control another computer or server. SSH works by encrypting all data sent between the two computers, including any usernames and passwords used to log in. In order to establish a secure SSH connection between two computers or servers, SSH keys are necessary. An SSH key is a pair of cryptographic keys - one public and one private. The private key is kept on ... Read More

How to Generate a Self-Signed Certificate for Kubernetes?

Satish Kumar
Updated on 06-Jun-2023 16:27:42

526 Views

Introduction In today's digital age, cybersecurity is a top priority for businesses and organizations. Data breaches and cyber attacks can result in significant financial losses and damage to reputation. Kubernetes is a popular container orchestration system used by many organizations to manage their containerized applications. However, with the increase in the number of containers, securing them has become a significant challenge. A self-signed certificate provides a simple and cost-effective way to establish secure communication between different components of Kubernetes, including the API server, etcd, and kubelets. Generating a Self-Signed Certificate for Kubernetes A Step-by-Step Guide to Generating a ... Read More

How to Generate a CSR (Certificate Signing Request) in Linux?

Satish Kumar
Updated on 06-Jun-2023 16:26:30

152 Views

Introduction In today's digital age, website security has become an extremely important aspect for businesses to consider. Cybercrime is on the rise and attackers are constantly finding new ways to exploit vulnerabilities in online systems. One of the main ways to protect websites from cyber threats is by implementing SSL/TLS certificates, which help encrypt data transmitted between a user's browser and a web server. A Certificate Signing Request (CSR) is an essential component of obtaining an SSL/TLS certificate. It contains information about the domain name and organization requesting the certificate, as well as other details required for verification purposes. ... Read More

How to Generate a Certificate Signing Request (CSR) With OpenSSL?

Satish Kumar
Updated on 06-Jun-2023 16:24:44

326 Views

Introduction A Certificate Signing Request (CSR) is a document that contains information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and relevant identifying information about the entity, such as its name and location. This information is used by a certificate authority (CA) to verify that the entity requesting the certificate is who they claim to be. The CSR is an essential part of the process of obtaining an SSL/TLS certificate because it allows for verification of your identity and ownership of your domain. Without a valid CSR, you cannot obtain an SSL/TLS certificate, which ... Read More

How to Generate & Set Up SSH Keys on Debian 10?

Satish Kumar
Updated on 06-Jun-2023 16:23:30

598 Views

Introduction In today's world, where most of the communication and data transfer happens over networks and the internet, security has become a crucial issue. An unsecured network can allow malicious users to intercept, modify, or steal sensitive data. To ensure secure communication over a network, encryption plays an essential role. Secure Shell (SSH) is an encrypted protocol that allows you to access a remote system securely. It provides secure communication between two untrusted hosts over an insecure network. SSH keys are the authentication credentials used by SSH for secure communication between systems. They provide a more secure way ... Read More

Advertisements