
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
469 Views
Introduction As world continues to grow more digital, need for secure and robust authentication systems becomes increasingly important. Passwords have been traditional method of authentication, but with rise of hacking and other cyber crimes, new authentication methods are needed. One such method is 3D passwords, an advanced authentication system that ... Read More

Satish Kumar
49K+ Views
Ubuntu 22.04 LTS (Focal Fossa) is latest long-term support release of Ubuntu, which means that it will be supported for five years with security updates and bug fixes. If you have just installed Ubuntu 22.04 LTS, congratulations! You are now ready to explore world of Ubuntu and take advantage of ... Read More

Satish Kumar
1K+ Views
Introduction Integrity of files and directories is an essential aspect of system security and data protection. File integrity refers to the accuracy and completeness of the information stored in a file, while directory integrity concerns the structure, permissions, ownership, and attributes of directories. When files or directories are tampered with ... Read More

Satish Kumar
5K+ Views
Introduction As a programmer or system administrator, you may need to check for file or directory existence frequently. Bash, which stands for "Bourne-Again SHell", is a Unix-based command-line interface that provides powerful scripting capabilities. In this article, we will explore how to check if a file or directory exists in ... Read More

Satish Kumar
529 Views
Introduction Released in early 2018, news of a previously unknown hardware vulnerability in Intel's CPUs shocked the IT industry. Dubbed as 'Meltdown, ' this exploit can potentially expose sensitive data on your computer such as passwords, encryption keys, and login credentials to hackers. In worst-case scenarios, it could allow attackers ... Read More

Satish Kumar
3K+ Views
Introduction Keeping your system up to date is essential for maintaining the security, stability, and performance of your computer. Cybercriminals are always looking for vulnerabilities in operating systems and software to exploit, putting you at risk of data breaches, identity theft, and other cyber threats. Moreover, software updates usually include ... Read More

Satish Kumar
172 Views
As a SaaS (Software-as-a-Service) business owner, protecting your data and customers should be a top priority. With an increasing number of cyberattacks and data breaches, you cannot afford to be complacent about your security measures. In this article, we will discuss some of the best practices you can implement to ... Read More

Satish Kumar
3K+ Views
Introduction If you are a Linux user, there is no doubt that you have heard of Ubuntu OS. Ubuntu is an open-source operating system based on the Debian architecture and is one of the most popular distributions of Linux. It's user-friendly interface, and versatile nature makes it a great operating ... Read More

Satish Kumar
13K+ Views
Introduction Ubuntu is a popular Linux operating system that gives users access to powerful tools for managing files, processes, and other system settings. One of the key features of Ubuntu is the ability to use "sudo" or "root" access to perform administrative tasks. This allows you to make changes to ... Read More

Satish Kumar
652 Views
Introduction Secure Shell (SSH) is a protocol that provides a secure channel over an unsecured network in Linux systems. It is commonly used for remote logins, file transfers, and executing commands on a remote machine securely. SSH is an essential tool for Linux system administrators, developers, and users who access ... Read More