Satish Kumar has Published 1032 Articles

Showing a GUI Notification From a Shell Script in Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:28:07

1K+ Views

There are several ways to display a GUI notification from a shell script in Linux, but one common method is to use the notify-send command. This command is part of the libnotify library and is typically pre-installed on most Linux distributions. An example of how to use notify-send to ... Read More

How to Calculate Optimal Blocksize to Use With dd in Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:26:05

5K+ Views

The optimal block size to use with the dd command in Linux depends on the specific use case and the hardware that you are working with. However, as a general rule of thumb, it is best to use a block size that is a multiple of the disk's physical block ... Read More

How to Check Logs Using journalctl in Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:24:40

3K+ Views

Logs are a crucial component of any Linux system, as they provide a record of system activity, including system events, user actions, and system processes. Log checking, or log monitoring, is the process of regularly reviewing log files to identify any unusual or suspicious activity, such as failed login attempts, ... Read More

Exclude grep From ps Results on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:23:03

2K+ Views

The ps command in Linux is used to display information about the running processes on a system. It provides a snapshot of the current processes, including the process ID (PID), the user that owns the process, the percentage of CPU and memory usage, and the command that started the process. ... Read More

Introduction to Bash Globbing on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:21:57

2K+ Views

Bash globbing is the process of using wildcard characters to match multiple filenames or paths. Bash provides several special characters that can be used for globbing, such as *, ?, and []. The * character is a wildcard that can match zero or more characters in a filename or path. ... Read More

Find and Convert Files Ending With CRLF on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:20:20

14K+ Views

You can use the find command in Linux to search for files ending with CRLF, and the dos2unix command to convert those files to use LF line endings. To search for files ending with CRLF, you can use the following command − find /path/to/search -type f -exec grep -Iq . ... Read More

The Reflection Attack

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 11:04:24

3K+ Views

What is Reflection Attack? A reflection attack is a type of cyber attack in which the attacker sends a large number of requests to a server, each with the victim's IP address as the source address. The server responds to these requests, sending a large number of responses back to ... Read More

Types of Authentication Protocols

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 11:02:27

8K+ Views

Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices are able to access protected resources, and to prevent unauthorized access or tampering. Types of Authentication There are many different types ... Read More

Hashed Message Authentication Code (HMAC)

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:57:46

13K+ Views

What is HMAC? HMAC (short for "Keyed-Hash Message Authentication Code") is a cryptographic hash function that uses a secret key as input to the hash function along with the message being hashed. The resulting hash value is unique to the message and the secret key, and can be used to ... Read More

Internet Security Association and Key Management Protocol (ISAKMP)

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:51:04

7K+ Views

What is ISAKMP? Internet Security Association and Key Management Protocol (ISAKMP) is a framework for establishing security associations (SAs) and performing key exchange in a secure manner. SAS are agreements between two devices that define how they will communicate securely. Key exchange refers to the process of exchanging keys or ... Read More

Advertisements