Potential Security Threats To Your Computer Systems

Potential Security Threats To Your Computer Systems Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental, or caused by natural disasters. In this article, we will introduce you to the common computer system threats and how you can protect systems against them. A … Read more

ifconfig

ifconfig in short “interface configuration” utility for system/network administration in Unix/Linux operating systems to configure, manage and query network interface parameters via command-line interface or in a system configuration scripts. The “ifconfig” command is used for displaying current network configuration information, setting up an IP address, netmask, or broadcast address to a network interface, creating an alias for the network … Read more

Install MySQL / MariaDB Server with PhpMyAdmin Centos 8

Install MySQL / MariaDB Server with PhpMyAdmin Centos 8 Install PHP, MySQL support package for PHP, and other PHP packages on your system for phpMyAdmin to connect with the database. dnf install -y wget php php-pdo php-pecl-zip php-json php-common php-fpm php-mbstring php-cli php-mysqlnd php-xml tar Install below PHP packages for phpMyAdmin to connect with the … Read more

Kubernetes – Labels & Selectors

Kubernetes – Labels & Selectors Labels Labels are key-value pairs that are attached to pods, replication controllers,s and services. They are used as identifying attributes for objects such as pods and replication controllers. They can be added to an object at creation time and can be added or modified at the run time. Labels are … Read more

Kubernetes Architecture

Kubernetes Architecture Kubernetes follows a client-server architecture. Wherein, we have master installed on one machine and the node on separate Linux machines.   The key components of master and node are defined in the following section. Kubernetes – Master Machine Components Following are the components of the Kubernetes Master Machine. etcd It stores the configuration … Read more

Kubernetes – introduction

Kubernetes – introduction Kubernetes is a container management technology developed in Google lab to manage containerized applications in different kinds of environments such as physical, virtual, and cloud infrastructure. It is an open-source system that helps in creating and managing the containerization of applications. Anyone who wants to understand Kubernetes should have an understating of … Read more

tcpdump : Linux Network Sniffer Tool

tcpdump: Linux Network Sniffer Tool tcpdump is a most powerful and widely used command-line packets sniffer or package analyzer tool which is used to capture or filter TCP/IP packets that are received or transferred over a network on a specific interface. It is available under most of the Linux/Unix-based operating systems. tcpdump also gives us an option to save captured … Read more

nmcli – Linux command

nmcli – Linux command nmcli, the network manager command-line interface is a nifty and easy to use tool that saves you lots of time when you need to configure an IP address. To display all the active network interfaces on your Linux system execute the command. $ nmcli connection show OR $ nmcli con show Note that con is … Read more

find command in Linux

find command in Linux The find command in UNIX or Linux is one of the most important and frequently used command. It’s a command-line utility for walking a file hierarchy. It can be used to find files and directories and perform subsequent operations on them. It supports searching by file, folder, name, creation date, modification date, owner, and … Read more