Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Prince Yadav
Page 7 of 20
How to Convert Images to WebP Format in Linux?
In today's digital age, images play a vital role in websites and various digital projects. But, the larger the image size, the longer it takes to load, leading to a poor user experience. You probably want to know the solution to this. Fortunately, Google has developed the WebP image format, which offers superior compression and quality compared to traditional image formats like JPEG and PNG. In this article, we will delve into how you can convert images to the WebP format on Linux using the WebP tools. By converting your images to WebP format, you can significantly reduce their file ...
Read MoreHow to Control Systemd Services on Remote Linux Server?
As Linux users and administrators, we are responsible for managing services on remote Linux servers, which could include web servers like Apache or Nginx, or database servers like MySQL or PostgreSQL. To effectively manage these services, we need to have a strong understanding of the underlying system and service manager for Linux - systemd. Systemd is a robust and feature-rich system and service manager designed for Linux-based operating systems. It takes care of managing the initialization and termination of services, tracks system processes, and oversees system resources. It is widely acquired as the default system and service manager in many ...
Read MoreDeprecated Linux Networking Commands and Their Replacements
Linux is a very popular operating system among developers and system administrators due to its strong and robust command-line interface (CLI). However, some of the networking commands have become outdated over time, making way for newer and more efficient options. In this article, we'll have a look at some of the deprecated commands and their new modern-day replacements to help you keep up with your Linux networking configurations. In this tutorial, we'll go through each of the deprecated commands and their corresponding substitutions. We'll also provide examples of how to use the new commands. By the end of this article, ...
Read MoreAnalyze Disk Usage in Linux Using Dutree
When managing our Linux systems, one of the most crucial things to consider is how we manage our disk space. Many of us are not aware of this, As we accumulate files and directories on our system, it's easy to lose track of what's taking up space and how to optimize our disk usage. But don't worry, that's where dutree comes in handy! In this article, we'll look into dutree in detail. We'll cover what it is, how to use it, and what benefits it offers for analyzing disk usage in Linux systems. Whether you're a Linux beginner or an ...
Read MoreCr3dOv3r – Credential Reuse Attack Tool in Kali Linux
In this tutorial, we will explore a powerful tool called Cr3dOv3r, which is used for conducting credential reuse attacks. Cr3dOv3r is specifically designed for Kali Linux, a popular Linux distribution widely used for penetration testing and ethical hacking purposes. In this article, we will delve into the functionalities and usage of Cr3dOv3r, providing step-by-step instructions along with code snippets and their explanations. By the end of this tutorial, you will have a solid understanding of how to leverage Cr3dOv3r to identify potential credential reuse vulnerabilities and enhance the security of your systems. Installation and Setup of Cr3dOv3r To begin, let's ...
Read MoreDEBUGFS Command to Show File Creation Times in Linux
The DEBUGFS command is a powerful utility in Linux that grants access to the file system of a block device. One of its notable features is its ability to reveal the creation time of a file, which cannot be easily obtained through typical Linux commands. This piece of information is stored in a data structure known as the inode, which houses diverse particulars about the file, including its creation time. To obtain the data using the DEBUGFS command accesses the inode of the file and provides a comprehensive view of the file system. This command facilitates the identification of the ...
Read MoreHow to Connect Wi-Fi from Linux Terminal Using Nmcli Command?
If you are a Linux user and wish to connect to a Wi-Fi network from a terminal. Although it may seem scary, it is actually a simple process using the Nmcli command. In this article, I will introduce you to the steps of connecting Wi-Fi from a Linux terminal using Nmcli commands in a simple and easy-to-understand way. So let’s get started! First, if we want to check the name of our network device we can simply do that by running the following command − $ iw dev You’ll get the output kind of this by running the command − ...
Read MoreWeb Scraping Financial News Using Python
Data extraction is vital in the digital age because of the wealth of online information. Extracting data from webpages through a process known as web scraping has grown in popularity for a variety of uses. For example, web scraping can be very helpful for gathering and analyzing financial news. One can automate the extraction of financial news from many sources, get insights, and make judgments by using Python, a flexible and potent computer language. The importance of financial news in today's frantic markets cannot be overstated. For their portfolio decisions, traders, investors, and analysts depend on current information. One can ...
Read MoreHow to Brute-Force SSH in Kali Linux?
Secure remote access is essential for both organizations and individuals in the connected world of today. For secure network communication and remote system administration, SSH (Secure Shell) has gained popularity. It is crucial to understand that SSH servers can be subject to brute-force attacks that aim to jeopardize their security. This article gives a general overview of brute-forcing SSH in Kali Linux, a well-known system for security analysis and penetration testing. Network administrators can strengthen their defenses and guarantee the integrity of their SSH servers by comprehending the mechanics of these attacks, taking ethical considerations into account, and putting mitigation ...
Read MoreHow to Block USB Storage Devices in Linux Servers?
USB storage devices have become ubiquitous in our technology-driven world, but they also pose a significant security threat to organizations. Attackers can exploit these devices to introduce malware, steal sensitive data, or gain unauthorized access to a network. To protect Linux servers against such attacks, administrators can take proactive measures by blocking USB storage devices. This article will delve into the various ways to accomplish this, including the benefits of each approach and the necessary steps to implement them. After reading this article, readers will be equipped with the knowledge to disable USB storage devices and secure their Linux servers. ...
Read More