- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who

Updated on 06-Jun-2023 16:47:35
Introduction Cybersecurity is a growing concern for businesses and individuals alike. One way to protect yourself against potential attacks is by hiding sensitive information such as your Apache version number. The Apache version number can be used by attackers to identify vulnerabilities in your system and launch an attack. Additionally, default Apache settings may reveal sensitive information such as server operating system, installed modules, or applications, which can make it easier for hackers to gain unauthorized access. By hiding the Apache version number and other sensitive information, you can reduce the risk of cyberattacks. Understanding Apache Version Number ... Read More 
Updated on 06-Jun-2023 16:46:17
Introduction As a Linux user, you may have heard the term "hacking" in relation to cybersecurity and assumed it was only used by malicious attackers. However, hacking can also be used as a means of improving your own system's security by identifying vulnerabilities and potential entry points that could allow others to gain unauthorized access. By hacking your own Linux system, you can identify these weaknesses before cybercriminals have a chance to exploit them. Preparing Your System for Hacking Installing Necessary Tools and Software Before attempting to hack your Linux system, it is essential to have the proper tools ... Read More 
Updated on 06-Jun-2023 16:44:40
Introduction Grep is one of the most powerful and widely used command-line tools in Linux/Unix systems. It stands for “Global Regular Expression Print” and is used for searching text files or output of commands for specific patterns or strings. It can search through an entire directory structure, filter the results and display only relevant data to the user. Grep is a versatile tool that can be used for many different tasks, including system administration, programming and data analysis. Basic Grep Commands Grep is a powerful command-line tool used in Unix-based operating systems to search for specific patterns or ... Read More 
Updated on 06-Jun-2023 16:41:55
Introduction Git is a popular version control system used by developers to track changes in their codebase. Git Stash is a feature that allows developers to temporarily save changes they have made to their working directory, without committing them to the repository. This feature is useful when developers need to switch to a different branch or work on another feature, but don't want to commit untested changes. When using Git Stash, all changes in the working directory are saved as a "stash" which can be retrieved later. This allows developers to work on multiple features simultaneously without having unfinished ... Read More 
Updated on 06-Jun-2023 16:39:47
Introduction Before we dive into the topic of how to get total inodes of root partition, let's start with understanding what inodes actually are. Inodes, short for Index Nodes, is a data structure used by the file system to store information about files and directories. Every file or directory on a Unix-based system has an inode associated with it, which contains metadata such as permissions, timestamps, and other attributes. In simple terms, an inode acts as a pointer to where data is stored on the hard drive. It is worth noting that unlike file names or directory names which ... Read More 
Updated on 06-Jun-2023 16:38:00
Introduction In the Linux operating system, a directory is similar to a folder in other operating systems. It's a way to organize files and other directories, which helps the user easily locate and access them. Directories can be nested within each other, creating a hierarchical structure that can be several levels deep. One important feature of directories in Linux is that they are treated as files themselves. This means that they have attributes and permissions, just like any other file. Directories also contain metadata such as creation time and last modified time. Method 1: Using the "du" Command Explanation of ... Read More 
Updated on 06-Jun-2023 16:35:47
Introduction Secure Shell (SSH) is a widely used protocol for securely connecting to remote systems over unsecured networks. It provides a secure channel for communication between two systems, allowing users to execute commands and manage files on remote machines without the risk of eavesdropping, tampering, or identity theft. However, despite its strong security features, SSH is still vulnerable to attacks from cybercriminals who seek to exploit weak passwords, unpatched software vulnerabilities, or misconfigured permissions. Therefore, it's essential to take proactive measures in order to secure your SSH access. Setting up Email Alerts for Root Login Exploring the Necessary ... Read More 
Updated on 06-Jun-2023 16:33:26
Introduction Helm is a well-known Kubernetes package manager and an open-source tool used to streamline the installation, upgrading, and management of Kubernetes applications. With Helm, users can create version-controlled application releases that are easy to reproduce and manage. The tool simplifies deployment by allowing developers to package their applications as charts that can be easily deployed on any Kubernetes cluster. Keeping track of changes made to releases is paramount in ensuring a smooth and efficient deployment process. That's where Helm logs come into play. Logging release changes with Helm helps you understand what has changed between releases, identify ... Read More 
Updated on 06-Jun-2023 16:31:12
Introduction In this article, we will focus on how to generate SSH keys on Ubuntu - one of the most popular Linux distributions used by developers worldwide. We will provide step-by-step instructions for generating an SSH key pair using both command line interface (CLI) and GUI tools like FileZilla. The article will also cover common issues that users may encounter when generating or using their SSH keys on Ubuntu along with troubleshooting tips and solutions for each issue. Whether you're a developer looking for secure access to remote servers or a system administrator tasked with maintaining security at scale, ... Read More 
Updated on 06-Jun-2023 16:29:39
Introduction SSH, short for Secure Shell, is an encryption protocol that provides a secure connection between two computers over an insecure network, such as the internet. It allows users to remotely and securely access and control another computer or server. SSH works by encrypting all data sent between the two computers, including any usernames and passwords used to log in. In order to establish a secure SSH connection between two computers or servers, SSH keys are necessary. An SSH key is a pair of cryptographic keys - one public and one private. The private key is kept on ... Read More Advertisements