Latest Posts Under: Linux

View Linux

Secured communication is inevitably a required norm in the world. To achieve the same, different methods are being approached. You must have heard the word “cryptography”, which is really useful to safely transmit your signals by ensuring secrecy. Today, with advancements in this field, we have 2 of its widely known types i.e. private key… Read Article →

Tired of using Bash terminal? Struggling with shell scripting. Want to try something better, easier to customize, configure. Fish is a simple, powerful yet user-friendly command-line shell giving you features that you have never heard of such as auto-suggestions, cleaner more organized scripts, web-based configuration/ customizations and a lot more. Read on for my take… Read Article →

Many operating systems use the concept of runlevels. This is particularly the case for System V Unix based systems. As you might have read in our earlier post how Linux boots it uses runlevels to determine what to do. Let’s study runlevels and rc scripts in detail. Runlevels Runlevels are the state to which a… Read Article →

Hello readers! Transferring data to your friends’ machine is not a big deal when using storage devices such as pen drives, CDs, etc. But have you ever intended to migrate files between different systems over a network, to a machine that’s out of your reach, like transferring data between an EC2 instance and your local… Read Article →

GPG or GNU Privacy Guard is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). It is a tool that provides encryption and signing services, using which, you can encrypt or sign your files, messages, emails and can even sign your github commits. In this guide, let’s get a walk… Read Article →

SSH is quite an interesting protocol in itself. A lot of people are using it for a secure communication between two machines. This blog post hits behind the scenes that go on, between machines connected via SSH. You might have an experience of remote login on SSH. But have you ever wondered about how internally… Read Article →

Ever wondered, what happens behind the scenes to boot Linux? Knowing about what happens from the time you press the power button to the time when you get the login screen on Linux, i.e. boot process in Linux is very important. It can come very handy when you’re debugging why isn’t a system booting properly… Read Article →

Git is the most popular version control system now a days. The reason behind popularity is its simple yet tremendous functionality. Unlike other VCSs (Version Control Systems), Git has some unique ways to control and share your data. Because of its huge functionality it also tends to become a lot complex for advanced users. As… Read Article →

Chef is an amazing configuration management tool, widely used in a lot of industries. If you are not familiar with how to run chef/chef-solo, please go through this article first. One of the best feature of Chef is it’s collection of resources. Resources allows Chef to handle configuration of the designated server. Resource have their… Read Article →

Scroll To Top