
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1032 Articles

Satish Kumar
1K+ Views
There are several ways to display a GUI notification from a shell script in Linux, but one common method is to use the notify-send command. This command is part of the libnotify library and is typically pre-installed on most Linux distributions. An example of how to use notify-send to ... Read More

Satish Kumar
5K+ Views
The optimal block size to use with the dd command in Linux depends on the specific use case and the hardware that you are working with. However, as a general rule of thumb, it is best to use a block size that is a multiple of the disk's physical block ... Read More

Satish Kumar
3K+ Views
Logs are a crucial component of any Linux system, as they provide a record of system activity, including system events, user actions, and system processes. Log checking, or log monitoring, is the process of regularly reviewing log files to identify any unusual or suspicious activity, such as failed login attempts, ... Read More

Satish Kumar
2K+ Views
The ps command in Linux is used to display information about the running processes on a system. It provides a snapshot of the current processes, including the process ID (PID), the user that owns the process, the percentage of CPU and memory usage, and the command that started the process. ... Read More

Satish Kumar
2K+ Views
Bash globbing is the process of using wildcard characters to match multiple filenames or paths. Bash provides several special characters that can be used for globbing, such as *, ?, and []. The * character is a wildcard that can match zero or more characters in a filename or path. ... Read More

Satish Kumar
14K+ Views
You can use the find command in Linux to search for files ending with CRLF, and the dos2unix command to convert those files to use LF line endings. To search for files ending with CRLF, you can use the following command − find /path/to/search -type f -exec grep -Iq . ... Read More

Satish Kumar
3K+ Views
What is Reflection Attack? A reflection attack is a type of cyber attack in which the attacker sends a large number of requests to a server, each with the victim's IP address as the source address. The server responds to these requests, sending a large number of responses back to ... Read More

Satish Kumar
8K+ Views
Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices are able to access protected resources, and to prevent unauthorized access or tampering. Types of Authentication There are many different types ... Read More

Satish Kumar
13K+ Views
What is HMAC? HMAC (short for "Keyed-Hash Message Authentication Code") is a cryptographic hash function that uses a secret key as input to the hash function along with the message being hashed. The resulting hash value is unique to the message and the secret key, and can be used to ... Read More

Satish Kumar
7K+ Views
What is ISAKMP? Internet Security Association and Key Management Protocol (ISAKMP) is a framework for establishing security associations (SAs) and performing key exchange in a secure manner. SAS are agreements between two devices that define how they will communicate securely. Key exchange refers to the process of exchanging keys or ... Read More