
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 2003 Articles for Operating System

327 Views
If you want to build a new container image, you need to specify the instructions in a separate document called Dockerfile. This will allow a developer to create an execution environment and will help him to automate the process and make it repeatable. It provides you with flexibility, readability, accountability and helps in easy versioning of the project.No doubt, writing a Dockerfile is one of the most important aspects of a project which includes development using docker. However, how you write a Dockerfile might have a great impact on the performance of your project if you are deploying it on ... Read More

292 Views
It’s true that the use of docker has skyrocketed in recent times and it will continue to increase in the coming years. Most organizations are now shifting their projects to docker containers if they have not already. Thus, only acquiring basic knowledge regarding creating and maintaining docker containers and images is not enough to keep up with the pace of such a huge technological shift.Managing a large number of containers and images through a single command line interface (CLI) seems to be a tedious task, but with proper set of management skills and hands-on experience with docker CLI commands, this ... Read More

340 Views
It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message and system related stuff/var/log/auth.log # Authenication logs/var/log/kern.log # Kernel logs/var/log/cron.log # Crond logs/var/log/maillog # Mail server logs/var/log/boot.log # System boot log/var/log/mysqld.log # MySQL database server log file/var/log/qmail # Qmail log directory/var/log/httpd # Apache access and error logs directory/var/log/lighttpd # Lighttpd access and error logs directory/var/log/secure # Authentication log/var/log/utmp # Login ... Read More

428 Views
Tmux is a terminal multiple for Unix OS. It provides multiple terminal sessions to its users. It is used when we are using cloud-based services (like Azure, AWS) for the creation of separate terminals for different remote users.While working with web services, one needs to create an EC2 instance on the webserver provided by the company to work on it by creating a session.Now, let’s see the steps of working on a UNIX (Ubuntu) webserver.Step 1 − Write/copy the IP address of your AWS console and download the key file from the console. You will get these from your vendor ... Read More

257 Views
FedoraFedora is Linux based and open-source operating system intended for developers and system administrators. It is supported by a huge Red Hat Community. It was introduced in Sep 2003. Initially, it was also known as Fedore Core. Fedora OS uses IPSec to connect to remote machines or networks. It uses Internet Key Exchange, IKE protocol to make secure, robust connections between machines.CentOSCentOS is also Linux based open-source distributed operating system. It is quite stable and robust. It was developed over source code Red Hat Enterprise Linux, RHEL and is actively developed by CentOS community which have large number of network ... Read More

1K+ Views
FedoraFedora is Linux based and open-source operating system intended for developers and system administrators. It is supported by a huge Red Hat Community. It was introduced in Sep 2003. Initially, it was also known as Fedora Core. Fedora OS uses IPSec to connect to remote machines or networks. It uses Internet Key Exchange, IKE protocol to make secure, robust connections between machines.Red HatRed Hat Enterprise Linux, RHEL is also Linux based operating system but it is targetted for business usage. It is sold using annual/monthly subscription basis including the technical support and Red Hat network. It was introduced in 1994 ... Read More

298 Views
FedoraFedora is Linux based and open-source operating system intended for developers and system administrators. It is supported by a huge Red Hat Community. It was introduced in Sep 2003. Initially, it was also known as Fedore Core. Fedora OS uses IPSec to connect to remote machines or networks. It uses Internet Key Exchange, IKE protocol to make secure, robust connections between machines.DebianDebian is again a Linux based open-source operating system. It is part of GNU project providing program components to Debian OS. Debian was developed targetting the end-users general purpose. It is highly user friendly and efficient. Many large and ... Read More

14K+ Views
Both Network OS and Distributed OS work on multiple systems/nodes. The main difference between a network operating system and a distributed operating system is the way they handle resources and communication between devices. A network operating system is primarily concerned with managing resources and communication within a single network, while a distributed operating system is designed to manage resources and communication across multiple networks. Read this tutorial to find out more about Network OS and Distributed OS and how they are different from each other. What is Network OS? A Network OS is a type of operating system that is ... Read More

442 Views
Microsoft has introduced the WSL Subsystem for Linux, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine.Limitations of Windows Subsystem for LinuxWhile this is a step in the right direction for Microsoft, it's not quite there yet in terms of full functionality. Specifically, WSL does not support AF_PACKET for security restrictions. This means that you won't be able to put a Wi-Fi adapter in promiscuous mode (or monitor mode), and tools that require raw sockets to function properly won't work, such as Nmap.Installation the Windows Subsystem for LinuxStep-1:To do so, ... Read More

341 Views
UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ... Read More