
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
990 Views
Introduction Before we dive into the topic of how to get total inodes of root partition, let's start with understanding what inodes actually are. Inodes, short for Index Nodes, is a data structure used by the file system to store information about files and directories. Every file or directory on ... Read More

Satish Kumar
29K+ Views
Introduction In the Linux operating system, a directory is similar to a folder in other operating systems. It's a way to organize files and other directories, which helps the user easily locate and access them. Directories can be nested within each other, creating a hierarchical structure that can be several ... Read More

Satish Kumar
1K+ Views
Introduction Secure Shell (SSH) is a widely used protocol for securely connecting to remote systems over unsecured networks. It provides a secure channel for communication between two systems, allowing users to execute commands and manage files on remote machines without the risk of eavesdropping, tampering, or identity theft. However, ... Read More

Satish Kumar
5K+ Views
Introduction Helm is a well-known Kubernetes package manager and an open-source tool used to streamline the installation, upgrading, and management of Kubernetes applications. With Helm, users can create version-controlled application releases that are easy to reproduce and manage. The tool simplifies deployment by allowing developers to package their applications as ... Read More

Satish Kumar
17K+ Views
Introduction In this article, we will focus on how to generate SSH keys on Ubuntu - one of the most popular Linux distributions used by developers worldwide. We will provide step-by-step instructions for generating an SSH key pair using both command line interface (CLI) and GUI tools like FileZilla. The ... Read More

Satish Kumar
854 Views
Introduction SSH, short for Secure Shell, is an encryption protocol that provides a secure connection between two computers over an insecure network, such as the internet. It allows users to remotely and securely access and control another computer or server. SSH works by encrypting all data sent between the two ... Read More

Satish Kumar
852 Views
Introduction In today's digital age, cybersecurity is a top priority for businesses and organizations. Data breaches and cyber attacks can result in significant financial losses and damage to reputation. Kubernetes is a popular container orchestration system used by many organizations to manage their containerized applications. However, with the increase ... Read More

Satish Kumar
429 Views
Introduction In today's digital age, website security has become an extremely important aspect for businesses to consider. Cybercrime is on the rise and attackers are constantly finding new ways to exploit vulnerabilities in online systems. One of the main ways to protect websites from cyber threats is by implementing SSL/TLS ... Read More

Satish Kumar
1K+ Views
Introduction A Certificate Signing Request (CSR) is a document that contains information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and relevant identifying information about the entity, such as its name and location. This information is used by a certificate authority (CA) to verify that ... Read More

Satish Kumar
1K+ Views
Introduction In today's world, where most of the communication and data transfer happens over networks and the internet, security has become a crucial issue. An unsecured network can allow malicious users to intercept, modify, or steal sensitive data. To ensure secure communication over a network, encryption plays an essential role. ... Read More