Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 43 of 94
How to Fix SSH Too Many Authentication Failures Error?
Secure Shell (SSH) is a cryptographic network protocol that provides secure remote access and file transfer over unsecured networks. It encrypts all traffic between hosts, ensuring data confidentiality and integrity. SSH is widely used by system administrators, developers, and IT professionals to remotely manage servers, access files, and execute commands. Understanding the SSH Authentication Error The "Too Many Authentication Failures" error occurs when an SSH server receives multiple failed authentication attempts in quick succession. By default, SSH servers limit authentication attempts to 6 tries within a short period. When this limit is exceeded, the server denies further attempts ...
Read MoreHow to Evaluate Arithmetic Expressions in Bash?
Bash is a powerful shell scripting language used on Linux and Unix systems. One of the most common tasks in shell scripting is evaluating arithmetic expressions. This article explores various methods to evaluate mathematical calculations in Bash scripts. Methods for Arithmetic Evaluation Bash provides several ways to evaluate arithmetic expressions. While the traditional expr command exists, modern Bash offers more efficient built-in methods. Using expr Command The expr command evaluates expressions passed as arguments: $ expr 2 + 3 5 Using Arithmetic Expansion $((...)) The preferred method uses double parentheses for ...
Read MoreHow to Fix ssh_exchange_identification read Connection reset by peer Error?
Secure Shell (SSH) is a protocol utilized for secure network communication, providing encrypted remote access to servers and computers across unsecured networks. Unlike protocols like Telnet and FTP that transmit data in plain text, SSH ensures confidentiality even over public networks like the internet, making it the de-facto standard for system administrators. However, SSH connections can encounter various errors that require immediate attention. One common and frustrating error is the ssh_exchange_identification read Connection reset by peer error, which can prevent remote server access and command execution. Understanding the Error The ssh_exchange_identification read Connection reset by peer error ...
Read MoreHow to Increase SSH Connection Timeout in Linux
Secure Shell (SSH) is a widely used protocol for accessing remote systems securely over an insecure network. When establishing an SSH connection, there is a timeout value that determines how long the connection can remain idle before being closed. This mechanism prevents unauthorized access but can be inconvenient during extended work sessions. The SSH connection timeout is essential for security, but it can be a hassle when working on remote systems for extended periods. This article discusses how to increase the SSH connection timeout in Linux through various configuration methods. Understanding SSH Connection Timeout The SSH connection ...
Read MoreHow to Fix Username is not in the sudoers file. This incident will be reported in Ubuntu?
If you're a user of Ubuntu, there's a chance that at some point, when trying to run a command as the superuser or administrator, you may have encountered an error message that reads: "Username is not in the sudoers file. This incident will be reported." This message typically appears when you attempt to execute an administrative command using the sudo command and your system does not recognize your username as having sufficient permissions to perform such actions. This error results from your username being absent in the sudoers file − a system configuration file that specifies which users ...
Read MoreHow to Install and Configure Memcached on CentOS 8
Memcached is a distributed memory object caching system that can significantly improve the performance of your website or application by storing frequently accessed data in memory, reducing the number of database queries required. In this article, we will guide you through the process of installing and configuring Memcached on CentOS 8. Step 1: Install Memcached on CentOS 8 The first step is to install Memcached on your CentOS 8 system. You can do this by running the following command − sudo dnf install memcached This command will download and install Memcached on your system. ...
Read MoreDisplay System Information in CLI with Neofetch
As a computer user, it's important to know the specifications and operating system information of the machine you're working with. This information can be helpful in troubleshooting issues or optimizing your system for better performance. While there are many graphical user interface (GUI) tools that can display this information, there are also command-line interface (CLI) tools that can do the same job. One such tool is Neofetch, a CLI system information tool that can display a variety of information about your system in an attractive, easy-to-read format. What is Neofetch? Neofetch is a command-line system information tool written ...
Read MoreBest RDP (Remote Desktop) Clients for Linux
Remote Desktop Protocol (RDP) is a popular tool for remotely accessing desktop environments on other computers. It allows users to connect to a remote desktop over the internet and access all files and applications on a remote machine as if they were sitting in front of it. While RDP is a Microsoft protocol, there are several excellent RDP clients available for Linux that enable seamless connections to Windows machines and other systems. What is RDP? Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft that enables users to remotely access and control a desktop computer over ...
Read MoreHow to Install “atop” to Monitor Logging Activity of Linux System Processes
As a Linux user, monitoring your system's performance and process activity is crucial for maintaining optimal system health. With numerous processes running simultaneously on your Linux system, tracking resource usage and identifying performance bottlenecks can be challenging. Fortunately, there's a powerful tool called atop that provides comprehensive system and process monitoring capabilities. In this article, we'll guide you through installing and using atop to monitor your Linux system effectively. What is Atop? Atop is a Linux performance monitoring tool that displays real-time system and process-level performance statistics. It provides a comprehensive overview of system performance, including CPU usage, ...
Read MoreCommand chaining: Inline or Already running process
Command chaining allows you to run multiple commands sequentially in Linux. This is useful when you need to execute a series of related operations, such as downloading a file, extracting it, and then cleaning up. Command chaining can be done inline when starting commands or applied to processes that are already running. Inline Command Chaining Bash provides several operators for chaining commands together. The general syntax is: ... Common Chaining Operators ; (semicolon) − Executes commands sequentially regardless of success or failure & (ampersand) − Runs the ...
Read More