linux

How to install python in target host using Ansible

Reading Time: 3 minutes Ansible is an open-source automation engine that automates software provisioning, configuration management, and application deployment. It is quickly becoming the popular configuration management tool today. It lets you to control and config the target nodes from single host machine. As we know the only requirement in target machine is the modern version of python installed. But what if the python version is not installed on Continue Reading

Let’s talk with Bash!

Reading Time: 4 minutes Bash is one of several well-known UNIX shells, its wide distribution with Linux makes it an important tool to know. It is an improved bourne shell and incorporates useful features from the Korn shell and the C shell. Let’s get started and talk with bash in some effective ways. What is Scripting? It basically involves writing a series of commands that are interpreted one by Continue Reading

Linux banner

Small Peek into Bash

Reading Time: 8 minutes What is Bash ? or what’s that Black screen that normally appears in Linux as Terminal. Thats what is Bash and we are going to have a peek of it in this Blog. Bash is a Unix shell written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. It was released in 1989 and has been distributed as Continue Reading

Introduction to GNU Parallel

Reading Time: 2 minutes When you run commands on Linux, be they one at a time at the prompt or from a bash script, those commands run in sequence. The first command runs, followed by the second, followed by the third. Granted, the time between commands is so minuscule, the naked eye wouldn’t notice. For some instances, that may not be the most efficient means of running commands. If Continue Reading

Asymmetric Encryption

Reading Time: 3 minutes If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from being understood by anyone except their intended recipients. It can also be used to prove that a message came from a particular person and has not been altered What does encryption do? A clear readable message is encrypted into a scrambled message. The scrambled message is sent Continue Reading

BIOS vs UEFI

UEFI v/s BIOS

Reading Time: 3 minutes BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all your hardware and the very machine you’re reading this blog on, wouldn’t even start. But what are the differences? And why are they mutually exclusive? BIOS BIOS stands for Continue Reading

An Introduction to SSH – Secure Shell

Reading Time: 4 minutes What is SSH ? SSH is a network protocol that allows secure connection between different computers. SSH protocol also referred to as Secure Shell, provides many functionalities like, Strong connection and security Strong authentication Maintains connection integrity Strong encryption. In general, there are different ways for logging in to a remote machine, Know the password of that machine. SSH public and private keys. Host-based authentication Continue Reading

A Quick Guide through UFW – Uncomplicated Firewall

Reading Time: 4 minutes UFW, short for Uncomplicated Firewall, is basically a simplified firewall mechanism that is implemented upon iptables itself. As a result, making it much easier to configure ufw than to configure iptables. Therefore, it can be said that ufw is technically a program for managing a netfilter firewall which aims to provide an easy to use interface for the user. Need for UFW – uncomplicated firewall Continue Reading

Ip6tables firewall

Reading Time: 4 minutes Hello readers, this blog will teach you about ip6tables and its use with some basic use cases.we will also see that how ip6tables different from iptables. what is iptables?  Iptables is a Linux command line firewall that allows system administrators to manage incoming and outgoing traffic via a set of configurable table rules. iptable vs ip6tables Ip6tables is used to set up, maintain, and inspect the tables Continue Reading

Creating Custom Daemons in Linux

Reading Time: 3 minutes Hello readers, in this blog we will be looking at what are daemons and how can we create a custom daemons in our systems. Daemon is called as a type of program which quietly runs in the background rather than under the direct control of a user. It means that a daemon does not interact with the user. Systemd Management of daemons is done using systemd. It is Continue Reading