linux

Linux banner

Small Peek into Bash

Reading Time: 8 minutes What is Bash ? or what’s that Black screen that normally appears in Linux as Terminal. Thats what is Bash and we are going to have a peek of it in this Blog. Bash is a Unix shell written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. It was released in 1989 and has been distributed as Continue Reading

Introduction to GNU Parallel

Reading Time: 2 minutes When you run commands on Linux, be they one at a time at the prompt or from a bash script, those commands run in sequence. The first command runs, followed by the second, followed by the third. Granted, the time between commands is so minuscule, the naked eye wouldn’t notice. For some instances, that may not be the most efficient means of running commands. If Continue Reading

Asymmetric Encryption

Reading Time: 3 minutes If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from being understood by anyone except their intended recipients. It can also be used to prove that a message came from a particular person and has not been altered What does encryption do? A clear readable message is encrypted into a scrambled message. The scrambled message is sent Continue Reading

BIOS vs UEFI

UEFI v/s BIOS

Reading Time: 3 minutes BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all your hardware and the very machine you’re reading this blog on, wouldn’t even start. But what are the differences? And why are they mutually exclusive? BIOS BIOS stands for Continue Reading

An Introduction to SSH – Secure Shell

Reading Time: 4 minutes What is SSH ? SSH is a network protocol that allows secure connection between different computers. SSH protocol also referred to as Secure Shell, provides many functionalities like, Strong connection and security Strong authentication Maintains connection integrity Strong encryption. In general, there are different ways for logging in to a remote machine, Know the password of that machine. SSH public and private keys. Host-based authentication Continue Reading

A Quick Guide through UFW – Uncomplicated Firewall

Reading Time: 4 minutes UFW, short for Uncomplicated Firewall, is basically a simplified firewall mechanism that is implemented upon iptables itself. As a result, making it much easier to configure ufw than to configure iptables. Therefore, it can be said that ufw is technically a program for managing a netfilter firewall which aims to provide an easy to use interface for the user. Need for UFW – uncomplicated firewall Continue Reading

Ip6tables firewall

Reading Time: 4 minutes Hello readers, this blog will teach you about ip6tables and its use with some basic use cases.we will also see that how ip6tables different from iptables. what is iptables?  Iptables is a Linux command line firewall that allows system administrators to manage incoming and outgoing traffic via a set of configurable table rules. iptable vs ip6tables Ip6tables is used to set up, maintain, and inspect the tables Continue Reading

Creating Custom Daemons in Linux

Reading Time: 3 minutes Hello readers, in this blog we will be looking at what are daemons and how can we create a custom daemons in our systems. Daemon is called as a type of program which quietly runs in the background rather than under the direct control of a user. It means that a daemon does not interact with the user. Systemd Management of daemons is done using systemd. It is Continue Reading

Amazon EMR

Reading Time: 3 minutes Businesses worldwide are discovering the power of new big data processing and analytics frameworks like Apache Hadoop and Apache Spark, but they are also discovering some of the challenges of operating these technologies in on-premises data lake environments. They may also have concerns about the future of their current distribution vendor. Common problems of on-premises big data environments include a lack of agility, excessive costs, Continue Reading

Users and Groups in Linux

Reading Time: 4 minutes Hello readers, welcome to my blog on users and groups in Linux. As we know that Linux is a multi-user operating system, we’ll see how to add and configure the users and groups in Linux. What does multi-user mean? An operating system is considered as multi-user when it allows multiple users to access a computer. Also, Keeping security in mind, it does not allow a Continue Reading