Deepak Prasad

Deepak Prasad

R&D Engineer

Articles by Deepak Prasad

csplit and split Command Examples in Linux (Cheat Sheet)

Learn how to split files in Linux using csplit and split commands. Covers pattern-based splitting, size-based splitting, prefixes, suffixes, and how to rejoin …

How to Create Symbolic Links in Linux (Soft & Hard Links Explained)

Learn how to create symbolic links in Linux using the ln command. Understand soft links vs hard links, when to use each, and how to verify, find, and remove …

chmod Recursive in Linux: Change File & Directory Permissions Safely

Learn how to use chmod recursive (-R) in Linux with clear examples. Change permissions for all files or directories using 755 or 777, avoid common mistakes, and …

cat Command in Linux: Syntax, Examples & Cheat Sheet (Beginner Friendly)

Learn the cat command in Linux with simple, practical examples. This beginner- friendly cheat sheet covers syntax, file creation, appending, line numbers, …

AWK Command in Linux: Complete Guide with Practical Examples

Learn the AWK command in Linux with practical examples. Covers syntax, patterns, columns, BEGIN/END blocks, loops, scripts, and real-world use cases.

How to Install .deb Files in Kali Linux (4 Easy & Safe Methods)

Learn how to install .deb files in Kali Linux using dpkg, apt, and gdebi. Step- by-step commands, dependency fixes, and best practices.

Long.MAX_VALUE & Long.MIN_VALUE in Java (Exact Values + Examples)

Learn the exact value of Long.MAX_VALUE and Long.MIN_VALUE in Java, why overflow happens, and how to safely handle large numbers with clear examples.

Bash Split String into Array (With Delimiters, Newlines & Examples)

Bash tutorial to split string into arrays using read -ra, IFS delimiters, and mapfile. Covers multi-line input and common mistakes.

Dashed Filename in Linux: What It Means and How to Fix It

How to create, read, modify, find and remove dashed filename and directories in Linux. Open and access files & directories starting with (dash) and double dash …

git remote add Explained (With Examples, Mistakes & Fixes)

Git remote add is a git command that enables developers to work on a central remote repo by creating remote duplicates. Remote add command serves as a means …

Set up proxy using http_proxy & https_proxy environment variable in Linux?

How to set up proxy on Linux using http_proxy and https_proxy environment variable. Export the variables or set using /etc/environment and /etc/profile.d script …

How to setup http/https proxy with special characters in password

How to export the variable "http_proxy" or "https_proxy" when there are special characters in username or password in Linux?

Automating Video Rendering with Music Visualizer APIs

Automating video rendering has become a practical necessity for platforms that generate repeated or large-scale media outputs. Music visualizers—dynamic

4 ways to SSH & SCP via proxy (jump) server in Linux

You can use either ProxyCommand or ProxyJump with ssh and scp respectively to connect target host or transfer files through any jump host with examples.

Benefits and Limitations of Free VPNs on Linux: Are They Worth Using?

Linux is widely regarded as one of the most secure, flexible, and transparent operating systems, which is why developers, administrators, and privacy-focused

Install Kubernetes on Ubuntu 24.10 [Step-by-Step]

In this tutorial we will share step by step instructions to install Kubernetes on Ubuntu 24.10 using containerd container runtime and Calico CNI. We will be

Modernizing IT Infrastructure for Better Performance and Scalability

In today's digital world, updating IT infrastructure is crucial for maintaining a competitive edge. Cloud-based solutions offer businesses the chance to

How Cloud Innovation Is Reshaping Compliance and Data Sovereignty

Compliance and data sovereignty have become defining issues for cloud adoption. Governments are setting strict boundaries on where sensitive information can

Top 5 Web Scraping Proxies: Best Picks for Data Collection

Any data collection setup starts with web scraping proxies. Without being restricted or blocked, they enable you to gather a huge amount of data from

Best Node.js Development Companies to Partner With

Discover the best Node.js development companies to partner with. Explore top firms known for delivering scalable, high-performance, and reliable Node.js …

17 Essential Digital Marketing Tools for 2025

Find the best digital marketing tools 2025. 17 essentials for data, design, and growth. Expert picks. Start improving your strategy today.

Data Privacy for Businesses Storing Client Data in the Cloud

Cloud storage is now indispensable for contemporary business functions. It enables companies to store large amounts of data, reduces IT maintenance costs, and

Beginners guide to learn Kubernetes Architecture

Kubernetes Cluster Architecture contains a controller (master) and worker node. There are three main components in the Kubernetes Cluster i.e. Nodes, Pods and …

Setup Lab Environment for CompTIA PenTest+ Exam (PT0-002)

In this tutorial we will be setting up the Lab Environment which we will use through out the course of CompTIA PenTest+ Tutorial.

SSH into VirtualBox VM [Step-by-Step]

2 different methods to ssh into virtualbox vm using bridged adapter or NAT with prot forwarding

Setup & verify Mutual TLS Authentication (MTLS) with OpenSSL

With mutual TLS authentication (MTLS), not only does the service side prove its identity by exposing a certificate, but also the clients prove their identity to …

Create Central Authentication Server with OpenLDAP and NSLCD in Ubuntu

In this tutorial we will cover the steps to install and configure OpenLDAP from scratch and then use the OpenLDAP server as a central authentication server

OpenSSL: Generate ECC Certificates for Apache Server

Elliptic Curve Cryptography (ECC) is an encryption technique that provides public-key encryption similar to RSA. We can generate ECC certificates using openssl …

Why Should You Use Datacenter Proxies for Streaming?

Streaming your favorite shows, movies, or live sports should be a smooth experience. However, various factors like geo-restrictions, bandwidth limitations,

What You Need to Know About Secure Access Service Edge

If you’ve ever felt like your online world is a bit too open and there's a gaping hole in your digital security, this is where Secure Access Service Edge

The Future of Container Runtime Security: Trends and Technologies to Watch

Containerization has flipped the way we build, deliver, and scale applications. Containers offer developers lightweight, efficient and portable environments

pam_tally2: lock user account after X failed login attempts in Linux

Use pam_tally2 to lock user account in Linux after X failed login attempts. Lock root and normal user, exclude users and group from being locked out.

pam_faillock: lock user account after X failed login attempts in Linux

This pam_faillock module maintains a list of failed authentication attempts per user during a specified interval and locks the account in case there were more …

Add Linux to Windows Domain using realm (CentOS/RHEL 7/8)

Step by step guide to add linux to windows Domain (Active Directory) using Realm tool on RHEL/CentOS 7/8. Join linux to windows domain. sssd active directory …

Secure OpenLDAP with TLS, MTLS, STARTTLS in Rocky Linux

Step by Step instructions to configure OpenLDAP over SSL/TLS using self signed certificates or Third party Root CA signed certificates using OpenSSL in Rocy …

Install and Configure OpenLDAP on Ubuntu [Step-By-Step]

OpenLDAP is an open-source implementation of the Lightweight Directory Access Protocol (LDAP). It's widely used for managing directory information, providing

Linux sftp restrict user to specific directory | setup sftp chroot jail

how to configure sftp server in linux step by step to sftp restrict user to specific directory in Linux Setup sftp chroot jail with authorized_keys passwordless …

Configure OpenLDAP Master Slave replication Rocky Linux 8

Step by step instructions to configure openldap master slave replication using Rocky Linux 8. test the master slave replication.

8 simple steps to configure ldap client RHEL/CentOS 8

Steps to install and configure ldap client using SSSD on RHEL and CentOS 8 Linux. The configuration using SSSD over TLS and SSL encryption for ldap client

How to run script with systemd at shutdown only (not at reboot)

Steps to run script with systemd at shutdown only with examples in CentOS/RHEL 7/8 in Linux. Run script or command before shutdown but not at reboot

How to run script after N minutes of boot with systemd CentOS/RHEL 7/8

How to execute command or run script after N minutes of boot using systemd timer in CentOS/RHEL 7/8 Linux fix systemctl failing with unknown section 'Timer'

How to read user input during boot stage with systemd in Linux

Shell script to read user input during boot stage in Linux with a systemd service in CentOS/RHEL 7/8 Linux. Take input at the startup script in Linux.

How to run script on startup using systemd in Linux

How to execute and run script at startup after N minutes with delay using systemd and without cronjob in CentOS/RHEL 7/8 Linux before login prompt appears

How to run script with systemd right before shutdown in Linux

Steps to execute and run script with systemd right before shutdown in CentOS/RHEL 7/8 Linux. Use Before=shutdown.target to execute command before shutdown

How to run script with systemd right before login prompt in CentOS/RHEL 7/8

How to execute or run script with systemd right before login prompt in CentOS/RHEL 7/8 Linux between rc-local.service and getty.target in service unit file

How to run systemd service as specific user and group in Linux

run service as user linux. systemd allow user to start service. systemd start service as user on boot run systemd service as specific user group CentOS/RHEl 7/8 …

10+ commands to list all systemctl services with status

In systemd all the services are part of unit files so to list services we must define --type= argument and to get the state of individual services we need …

Beginners Guide on systemd tutorial in Linux

Overview on systemd unit file. Create your own systemd service unit file with example. Difference between Requires, Wants and Conflicts in unit file

Understanding systemd-journald and how logging works with Journal in RHEL 7

An overview on systemd-journald service, how logging happens in RHEL 7 Linux with Journals and systemd-journald logrotate. Compare systemd-journald vs rsyslogd

How to enable persistent logging in systemd-journald without reboot

Enable persistent logging in systemd-journald by changing storage type to persistent in journald.conf to store logs in /var/log/journal without reboot

How to mount filesystem without fstab using systemd (CentOS/RHEL 7/8)

We mount filesystem using /etc/fstab to make the changes persistent across reboot. Now there is another way to mount filesystem without fstab using systemd.

How to mount partition using systemd unit file? [SOLVED]

Steps to automount file system using systemd automount unit file without /etc/fstab to automatically mount and unmount file system in rhel/centos 7 and 8

How to force file system check on boot: systemd-fsck RHEL/CentOS 7/8

Creating /forcefsck and /fsckoptions doesn't work on CentOS/RHEL 7/8 Linux How to perform force file system check on boot (next reboot) using systemd-fsck?

How to start systemd service after NFS mount in Linux

How to execute a script after a network file system is mounted? How to start a systemd service only after NFS share is mounted and available in Linux

How to access VirtualBox shared folder at startup with systemd in Linux

How to mount Oracle VirtualBox shared folder using systemd unit file at system startup? How to execute a script during reboot on the shared folder from Vbox …

Create systemd service in Linux [Explained with Example]

Step by Step instructions to create systemd service in Linux. Detailed explanation of all the field in systemd service unit file

OpenSSL create Certificate Chain [Root & Intermediate CA]

Steps to create root and intermediate CA certificate and combine them to openssl create certificate chain. Openssl verify certificate chain (CA bundle)

Steps to generate CSR for SAN certificate with OpenSSL

Step by step instruction to generate Certificate Signing Request (CSR) for Subject Alternative Name (SAN) certificates using openssl with examples in Linux

2 easy methods to extend/shrink resize primary partition in Linux

Resize primary partition shrink and extend non lvm root, boot and other primary partition, change size of partition using unallocated free space fdisk & parted

Configure multi-master replication OpenLDAP [Step-by-Step]

Multi-master replication in OpenLDAP is a replication technique using Syncrepl to replicate data to multiple provider ("Provider") Directory servers. Under the …

OpenLDAP Migration Tutorial [Step-by-Step]

Perform openldap migration from one machine to another. Migrate system users to ldap user database using migrationtools rpm

Kubernetes Tutorial for Beginners & Experienced

Kubernetes Tutorial, Kubernetes Exam dumps, Kubernetes Documentation, Certified Kubernetes Application Developer (CKAD), Certified Kubernetes Administrator …

Step-By-Step Tutorial: Use rootkit malware scanner (rkhunter) to detect malware

Perform rootkit malware scanner centos rhel linux using rkhunter. detect rootkit malware using rkhunter with examples. Analyse rkhunter logs

Ansible Tutorial for Beginners [RHCE EX294 Exam]

This contains a consolidated list of topics from Ansible tutorial to help you go from beginner to pro. Prepare for EX407 Ansible Automation Specialist Exam.

Top 4 Security Risks for Cloud Computing

Since its inception, cloud computing has significantly developed, offering unmatched IT security among many niches and industries. Unlike on-premise

How to monitor Kubernetes Pod and Sidecar Container Resources

In my earlier article I had explained about Kubernetes Resources and how to assign resource quota in a namespace. Now let's make things more interesting and

How is Artificial Intelligence Going to Change the World?

Artificial intelligence (AI) was once a sci-fi fantasy but is now an everyday reality, permeating every aspect of our lives. AI isn't only another tech

[SOLVED] pip command not found in Ubuntu

There are two different versions of pip which you can install to solve the error i.e. pip command not found in Ubuntu 20.04 Linux. Step by Step instructions to …

COMPLETELY Uninstall Docker in Ubuntu [100% Working]

Step by step instructions to uninstall docker in Ubuntu. Cleanup and Delete all docker resources safely and completely

30+ firewalld command Examples [Rules Cheat Sheet]

firewalld is major available for RHEL/CentOS and similar distro using the same source code. But here's where things get a bit confusing. On RHEL/CentOS

Scared of git pull --rebase? Rebase with Confidence

Explore the transformative power of git pull --rebase. Streamline Git histories, bolster collaboration, and navigate version control with precision. Make git …

How to reduce Git repo size with git filter-branch

In this tutorial, we'll learn how to shrink or reduce Git repo size using git filter-branch. We'll cover identifying large files, safely removing them, and …

CompTIA PenTest+ (PT0-002) Exam Dumps with Practice Questions [FREE]

Since you are here so I can only assume you are also interested in becoming cybersecurity penetration tester, also called an Ethical Hacker. This tutorial is

Learn about SQL Injection Attack with Example

People say they know what SQL injection is, but all they have heard about or experienced are trivial examples. SQL injection is one of the most devastating

Beginners guide on PKI, Certificates, Extensions, CA, CRL and OCSP

Understanding overview on PKI, Certificate Authority, Certificate Revocation Lists, Online Certificate Status Protocol, Certification Authorities & Hierarchies

Steps to create Self-Signed Certificate with OpenSSL

Steps with openssl create self signed certificate Linux with and without passphrase. Use self signed certificate with Apache webserver example

Revoke certificate and generate CRL OpenSSL [Step-by-Step]

Step by step instructions to revoke or delete certificate from keystone and generate CRL Certificate Revocation List) using openssl in Linux with example …

Create SAN Certificate | OpenSSL generate CSR with SAN command line

Create SAN certificate using openssl generate csr with san command line. Openssl sign CSR with Subject Alternative Name. openssl add san to existing certificate …

OpenSSL create Client Certificate & Server Certificate with Example

Steps to create client certificate and server certificate using your own Certificate Authority chain (CA bundle) and configure Apache with SSL (HTTPS)

How to create Self-Signed CA Certificate with OpenSSL

Learn how to generate a ca certificate and how to sign a certificate using openssl. Steps to create certificate authority CA and CSR with openssl

Simple Steps to Generate CSR using OpenSSL with Examples

Steps to generate csr (certificate signing request) using openssl in Linux with examples. Create private key with and without passphrase.

Useful OpenSSL command to view Certificate Content

Use openssl to view certificate content for different kinds of certificate. how to read x509 certificate. view certificate details

How to Renew Expired Root CA certificate with OpenSSL

Technically you can't renew expired root CA certificate instead you can create a new root ca certificate using private key with openssl. The new root CA …

Renew SSL/TLS certificate OpenSSL [Step-by-Step]

Step by Step instructions to renew SSL or TLS certificate (server/client) using OpenSSL command. Retain all SAN fields with X.509 extensions during renewal of …

Renew self-signed certificate OpenSSL [Step-by-Step]

Step by Step instructions to renew self-signed certificate using OpenSSL command. Export CSR using expired certificate and using existing private key we can …

Shell script to generate certificate OpenSSL [No Prompts]

Step by Step instructions to use shell script to generate certificates with openssl. generate both self signed and rootCA signed certificates using bash or …

Things to consider when creating CSR with OpenSSL

We must consider some important point when creating CSR or else we may face issues later while using the certificate

How to manually expire any certificate OpenSSL

Step by Step instructions to manually expire any certificate using openssl. Different commands and methods to generate an expired certificate

openssl ca vs openssl x509 comparison [With Examples]

Detailed comparison between openssl ca vs openssl x509 command with examples. Similarities and difference between ca vs x509 argument of openssl command

How to add X.509 extensions to certificate OpenSSL

Step by Step instructions to add X.509 extensions to certificates, CSR, RootCA using openssl command.

Generate duplicate certificates OpenSSL CA [Same CN]

Step by step instructions to generate duplicate certificates with OpenSSL CA using the same CSR with same Subject (Common Name) in all the certificates

How to revoke missing/lost certificate OpenSSL [Step-by-Step]

Step by step guide to revoke missing or lost certificate using openssl. We can manually update the CA database to mark any certificate revoked and generate CRL

4 step quick guide to install SSL Certificate on Nginx

Install an SSL certificate on Nginx in just 4 steps. Secure your website with HTTPS and gain the trust of your visitors with a valid SSL certificate.

Golang Shiny Explained: From Zero to GUI Hero

Dive deep into Golang Shiny, a powerful package designed for intuitive GUI applications. Explore core concepts, animations, transformations, and create …

Golang Base64 Encoding Examples with Best Practices

Learn the best practices for base64 encoding in Go with practical examples. Boost your knowledge on golang base64 encoding techniques.

Is go-ternary a Hero or Villain in Golang's Story?

Explore the dynamic landscape of Go programming with the go-ternary package. Dive deep into its powerful features, understand its potential positives and …

Install Go 1.21 and Setup GO Workspace in Ubuntu

This tutorial guides you through detailed steps to install Go 1.21 on Ubuntu, covering steps from uninstalling older versions, downloading and installing Go, to …

Python Anonymous Function [In-Depth Tutorial]

In Python, a lambda function is an anonymous function, meaning it's a function without a name. Unlike named functions defined with the def keyword, lambda

Solve FileNotFoundError in Python [100% Working]

Discover how to handle and prevent the common 'File Not Found Error' in Python. This comprehensive guide explores the reasons for this error, how to handle it …

Master Python Pylint: Elevate Your Coding Game

Unlock the power of Python Pylint, go-to code analysis tool. Learn how to install, configure, and leverage its extensive feature set for cleaner, more efficient …

Master Faiss Python API to Maximize Search Efficiency

Unlock lightning-fast search capabilities with the Faiss Python API. Discover how to harness its power for precision and efficiency in your applications. …

Master Python Cobalt Library [In-Depth Tutorial]

Explore the powerful capabilities of Python Cobalt in legal document management. This definitive guide covers everything from basic concepts to advanced …

Master Python Multiprocessing [In-Depth Tutorial]

Discover the capabilities and efficiencies of Python Multiprocessing with our comprehensive guide. From core concepts to advanced techniques, learn how to …

Master Python Multithreading: Avoid Common Pitfalls

Uncover the secrets of Python Multithreading to optimize your applications. Our comprehensive guide takes you through core concepts, best practices, and …

Master Python dataclasses [In-Depth Tutorial]

Unlock the full potential of your Python dataclasses. Learn how to simplify your coding process, make it more efficient, and avoid common mistakes. This …

Master Python Yield keyword: Don't Be a Rookie!

Explore the transformative potential of Python yield keyword in our comprehensive guide. Whether you're a beginner or an experienced developer, learn to master …

Ultimate Guide on Pytest Logging: Avoid Pitfalls!

Unlock the full potential of your test automation with our in-depth tutorial on Pytest Logging. From setting up to mastering advanced features, become an expert …

Master Python ZipFile Library [In-Depth Tutorial]

Discover the untapped potential of Python ZipFile library. From basic archiving to advanced techniques like password protection and in-memory operations, this …

How to create Progress Bars in Python with Examples

Discover the most comprehensive guide to Python Progress Bars. Whether you're a beginner or an expert, this guide offers something for everyone—from quick- …

Create Simple & Complex Python Package with Examples

This guide will lead you on how to create a Python package which includes setup, configuration, building and publishing. You will learn how to include more …

Python Matplotlib: Ultimate Guide to Beautiful Plots!

Discover the ultimate guide to mastering Python Matplotlib for data visualization. From basic plots to advanced techniques, this comprehensive tutorial is …

Master Python Shelve Module: Unlock Hidden Potential

Discover the ins and outs of Python Shelve, the powerful yet simple data persistence solution. Whether you're a beginner or an experienced developer, our …

GO Bytes to String Conversion Best Practices [5 Methods]

Learn the best practices for go bytes to string conversion with 5 methods. Improve your Go programming skills for textual and binary data representation.

100+ Linux commands cheat sheet & examples

A complete consolidated linux commands cheat sheet with 100+ commands for system, network, linux, devops engineers and administrators

Cannot assign requested address [SOLVED]

The "Cannot Assign Requested Address" error is quiet common in the network community and can be seen in various network-related and application specific

Git Workflow | Git Lifecycle | Gitflow Tutorial

The Git workflow model include the remote repository, the local repository, the staging area, and the working directory. The git lifecycle contains untracked, …

Fixing 'SSH: No Route to Host' Error [7 Reasons]

The "SSH: No route to host" error to be honest can occur n number of issues. There is no specific one solution which will work for all scenarios. So in this

27 nmcli command examples (cheatsheet), compare nm-settings with if-cfg file

nmcli command examples. Create delete modify network connection bond NIC Team Activate de-activate reload ipv4 ipv6 connection chnage static to dhcp config

Install Tor Browser on Kali Linux [2 Methods]

Step by Step instruction to install tor browser on Linux. Two different methods to install and launch tor browser using terminal

10 Best Open Source VPN Software for Linux in

Top 10 Open-Source Vpn Software for Linux. Check out our list and the pros and cons for every VPN software and choose what suits you best.

Top 5 Fuzzing Tools for Web Application Pentesting

In this tutorial we explore top 5 fuzzing tools used for application web testing with installation steps and usage.

fatal: couldn't find remote ref main [SOLVED]

Let me guess, you are here because you are trying to figure out how to fix fatal: couldn't find remote ref main, well duh!, that's what the title says.

5 ways to find and remove unused docker containers

To properly remove unused Docker containers, you must first identify them and then delete in order to release space safely. There are several ways you can do

Escape Single Quote in SQL Server [4 Methods]

Escaping single quotes in SQL is necessary once you want to include a literal single quote character (') in a string within your SQL queries. This is

FIX: No such file or directory in Python [6 Reasons]

The “No such file or directory” error is a well-known problem in Python, typically encountered when working with input/output (I/O) operations on files. This

How to update multiple columns in SQL? [SOLVED]

Updating multiple columns in an SQL database is often done using various ways depending on the requirements. Here I will cover some of the most common and

Migrate CentOS 7/8 to Rocky Linux 8 [100% Working]

Step by Step guide to upgrade or migrate CentOS 7 and 8 to Rocky Linux 8. There will be no data loss during the migration.

How to upgrade CentOS 7 to 8 PROPERLY [100% Working]

The process of upgrading from CentOS 7 to CentOS 8 is not straightforward. There are significant differences between the two versions, including the

Learn about MAC Spoofing using Practical Example

MAC Spoofing is the process of changing the Media Access Control (MAC) address of a network interface on a device that’s connected to a network. The MAC

Yersinia GUI not working on Kali Linux [SOLVED]

Lately while working on Kali Linux I encountered this error when trying to execute yersinia -G and the Yersinia GUI was not working.

How to perform ARP Poisoning or Spoofing

ARP (Address Resolution Protocol) is a key network protocol used in IPv4 networks to link IP addresses to their corresponding MAC addresses. It plays an

How to perform DNS Cache Poisoning (Spoofing)

DNS Cache Poisoning is an attack that's also known as DNS Spoofing. It's a type of cyber attack where hackers exploit vulnerabilities in the Domain Name

How to perform Denial of Service (DoS) Attack

Imagine being at a cafe with a friend, trying to have a conversation when all of a sudden, a group of people come in and start shouting. You can’t even hear

Exploit Vulnerabilities using Metasploit

Metasploit is a mighty and elastic framework that you can use in the development, examination, and implementation of exploits. In 2003 H.D. Moore created it,

6 Tools to Perform Credential Attack [100% Working]

Credential attacks are a type of cybersecurity threat that focuses on one thing: gaining unauthorized access to systems or networks. Attackers do this by

Vulnerability Scanning Tools with Examples

Vulnerability scanning is the process of inspecting an information system for known security weaknesses. This process provides results with no

Network Reconnaissance using Nmap [Cheat Cheet]

Network reconnaissance is a critical part of any network pentesting operation. Knowing more information about the target’s network will let us know about the

3 Methods to Perform DNS Reconnaissance

DNS reconnaissance is a technique to gather information about DNS (Domain Name System) data. This process helps in identifying the network infrastructure and

Top Open-source intelligence (OSINT) Tools

OSINT aka Open source Intelligence is the data and information that is retrieved from all kinds of sources like Social media , Search engines , Domains , DNS …

Active and Passive Reconnaissance Explained

Common active reconnaissance methods include the following:

Golang strconv Magic: Empower Your String Operations

Discover the versatility and power of the Golang strconv package. Dive into a comprehensive guide that covers every function, best practices, and pitfalls to …

Master the Basics: How to Sort in Go with Ease

Master the intricacies of sorting in Go with our comprehensive guide. From basic techniques to advanced strategies, discover how to sort in go effectively and …

Golang String Contains Exposed: PRO Tips and Tricks

Master the essentials of 'golang string contains' for effective substring checks. Dive into case sensitivity, prefix/suffix comparisons, and regex alternatives. …

How to create PAM Module using Golang [Step-by-Step]

Step by step instructions to create or build a PAM Module using Golang and CGO language. The PAM module will import the required C functions using CGO and use …

How to Install GoBuster with Basic Usage on Ubuntu

This tutorial will guide you through steps to install Gobuster on Ubuntu, configuring it, and basic to advanced usage tips, including working with wordlists and …

3 Simple Methods to Install HPLIP on Ubuntu

This tutorial will guide you through step by step instructions to install HPLIP on Ubuntu, covering prerequisites, installation methods, fixing common issues, …

Install Kali Linux on Android [100% Working]

Step by step instructions to install kali linux on android with screenshots. Even though we have successfully installed a full-featured Kali Linux on Android …

Securing the Gateways to Your Digital Realm

In the bustling metropolis that is the cloud, our first line of defence against digital wrongdoers is what's known as the Identity provider, or IdP for short.

DevSecOps Best Practices for 2024

DevSecOps is like adding a security guard to the team that builds and maintains software. In the old way of doing things, this security guard would only check

How to Mitigate the Dangers in Cloud Hosting Online Safety

In this fierce era of competition, cloud computing is no longer just an option for businesses. It has occupied the business world lately. Whether it is a

How to Install and Configure PostgreSQL on Ubuntu?

This tutorial guides you through step by step instructions to install PostgreSQL on Ubuntu, including system preparation, secure installation, basic …

How to install ImageMagick on Ubuntu? [2 Methods]

This tutorial will guide you through step by step instructions to install ImageMagick on Ubuntu, covering various methods like APT and compiling from source. …

Steps to Install Darktable on Ubuntu [4 Methods]

In this tutorial, we'll guide you through steps to install Darktable on Ubuntu, a powerful photo editing tool. We'll cover different methods including APT, PPA, …

How to extract specific file, link & folder from tar.gz

In this tutorial, we'll explore how to extract specific files, folders, and symbolic links from a tar.gz archive, using straightforward command-line techniques …

How to Install and Configure Memcached on Ubuntu?

This tutorial will guide you through detailed steps to install and configure Memcached on Ubuntu. We'll cover the installation process, setting up the …

How to Install Dart on Ubuntu with Hello World Code

This tutorial will guide you through step by step procedure to install Dart on Ubuntu, covering two installation methods (APT and Debian package), verifying the …

How to Install Chkrootkit on Ubuntu? [Step-by-Step]

This tutorial guides you through the steps to install chkrootkit on Ubuntu, including various installation methods, verifying the installation, basic usage, …

3 Simple Methods to Install Joplin on Ubuntu

This tutorial will guide you through steps to install Joplin on Ubuntu, covering different installation methods (official script, Snap, Flatpak), launching the …

Simple Steps to Install Caddy Web Server on Ubuntu

Step by Step instructions to install caddy web server on Ubuntu. The article also demonstrates steps to setup your first webserver using Caddy.

Install Terminator Terminal on Ubuntu [Step-by-Step]

Step by Step instructions to install terminator terminal on Ubuntu with screenshots. Configure Terminator to split screen and other settings.

How to Install XFCE on Ubuntu [Step-by-Step]

In this tutorial we will explain about XFCE Desktop Environment, it's pros and cons. We will also cover step by step instructions to install XFCE on Ubuntu and …

How to Install PhotoQt on Ubuntu? [Step-by-Step]

Step by Step instructions to install PhotoQt on Ubuntu environment.

Install Kali Linux on Apple M1 with UTM [100% Working]

Step by step instructions to install Kali Linux on Apple M1 Laptop using UTM

GO Methods vs Functions [In-Depth Explanation]

This tutorial explores the distinctions between Go's functions and methods, covering their declaration, usage, practical examples, and best practices for …

Master Golang Garbage Collector Techniques Like a PRO

Explore the dynamic capabilities of the Golang Garbage Collector in our latest guide. Discover how to optimize memory management and enhance application …

Check CPU Utilization in Linux Like a PRO [7 Tools]

Learn how to efficiently monitor and optimize your system's performance using tools like top, htop, vmstat, and more. These will be useful to check CPU …

50+ tmux cheat sheet and shortcut commands

In this tutorial I have shared the most used tmux cheatsheet with the list of commands and shortcuts for sessions, windows panes etc in tmux

SQL Date Format Explained with Examples

Different types and formats of SQL date format explained with examples. SQL datetime format syntax, type and examples. sql server date format.

Pandas concat() Function Tutorial [Practical Examples]

Discover the ultimate guide to mastering pandas concat in Python. Whether you're a beginner or an experienced professional, our comprehensive guide offers …

Golang Buffered Channel Tutorial [Practical Examples]

A buffered channel is a type of channel that has storage capacity within. Create and handle deadlock scenario, create lock and unlock code with buffered channel …

Build Web Server using GO [Basics to Advanced]

Explore the remarkable world of Golang web server development. Uncover powerful strategies, essential tools, and best practices to optimize, secure, and …

The imperative of attack simulation in modern cybersecurity

Imagine locking every door and window in your house, only to realize there's a hidden passage you've overlooked—that's what it's like without the vital

Mastering Python subprocess Module [In-Depth Tutorial]

The different functions available with python subprocess are Popen(), call(), run(), check_call(), check_output(). What is the difference between these …

Python pass statement Explained [Beginners Guide]

When do we use python pass? Understand python pass statement usage with practical examples.

Python copy list - deepcopy() vs copy() with examples

The major difference between python deepcopy() and shallow copy() function is that the deepcopy() function copies the data of an object "recursively".

Master Pandas iloc: Definitive Guide to Data Slicing

Explore the comprehensive guide to pandas iloc, the powerful indexer for pandas DataFrames and Series. Learn through examples and FAQs how to perform simple to …

The Ultimate Guide to Python Argparse: No More Excuses!

Python argparse, supplies a host of features, making it easy to add argument handling to scripts. You can make arguments required or optional, have the user …

Python Numbers | Integers | Float | Complex Number

In this tutorial we learn about Python integers, python numbers with examples. What is an integer in Python. WHat are numbers in Python programming.

Flask SQLAlchemy [In-Depth Tutorial]

Flask SQLAlchemy is an extension for flask that adds support for SQLAlchemy to flask by adding useful defaults and helpers that simplify basic tasks

Use Python Logging Like a PRO: Don't be a Rookie

Learn how to use python logging module with examples. Write to console, stdout, stderr, to log file or syslog. Create single or multiple handlers using …

How to run shell commands in Python? [SOLVED]

There are different modules available which can be used to execute or call shell commands inside Python program.

How to use Python next() function? [SOLVED]

The next() function is a built-in function in Python that retrieves the next item from an iterator. It takes an iterator as an argument and returns the next

Create nested directories in Python [Practical Examples]

File creation and manipulation is considered a critical operation for any application. While creating a file, if any mistakes are made, it will affect the

How to check file exists in Python [Practical Examples]

Using os.path.exists() function, Using os.path.isfile() , Using the is_file() of pathlib module, Using os.path.islink() to check file exists and is a symbolic …

Python continue Explained [Beginners Guide]

Using python continue statement in for loop, while loop, if condition, nested for loop, nested while loop, multiple continue statement with examples

Check if Python String contains Substring [5 Methods]

How to check if string contains substring in Python. Look out for exact match, case insensitive match or use regex to match the pattern in Python script

SOLVED: How to loop n times in Python [10 Easy Examples]

for loops python, python repeat number n times, python loop n times, python repeat string n times, while loop python, for i in range python, python repeat …

4 ways to add row to existing DataFrame in Pandas

how to add row/s to an existing panda dataframe using append(), loc[] and concat() functions. We also included and excluded indices with concat() function.

Python list extend() method [Practical Examples]

In Python, the list is an ordered and mutable container. The extend() method is used to add the items from other iterable to the existing list. In other words, …

Python append() vs extend() in list [Practical Examples]

In this tutorial we will cover multiple examples to understand the difference between list.append() vs list.extend() method. We will [erform a 1 to 1 comparison …

SOLVED: List unique characters from a string in Python

As we know, that the set data structure only stores the unique elements in it. It does not allow repeated values. So, we can utilize this feature to list

Mastering Python len() Function [In-Depth Tutorial]

The len() function in Python is a built-in function that returns the number of items in an object. It's one of the simplest and most frequently used functions

How to PROPERLY use break statement in Python [Easy Examples]

python break statement into multiple lines, python break statement in nested loop, python break statement example, python break statement not working, python …

Is it possible to copy string in Python? [SOLVED]

Python strings are immutable, which means that it cannot be changed but there are ways to copy strings in Python. In this tutorial we will cover different …

Python function Return Multiple Values [SOLVED]

In this tutorial we learn how in python function return multiple values in different data types such as List, Tuple or Dictionary.

Loop over Single or Multiple Lists in Python Like a PRO

Learn with an extensive guide on how to loop through Lists (one or more) in sequential or parallel manner using different methods.

Flask Templates with Jinja2 Explained in Detail

Jinja2 is python based template engine used in flask, it is built in flask, so you do not need to download a separate package to use jinja2 with flask, it is …

10+ simple examples to learn python sets in detail

Python sets are collections of unique and unordered items. It implements all the fundamental operations from set theory, like union, intersection, subset tests …

Compare Strings in Python like a PRO: Don't be a Rookie

Compare strings in Python lexicographically using the numeric equivalents (the result of the built-in function ord()), with equal to, greater than and other …

How to PROPERLY Rename Column in Pandas [10 Methods]

In this tutorial we will learn use pandas dataframe.rename() and other methods to rename column in a List, CSV files, Dictionaries or any other type of object …

Your Friendly Guide to Type Checking in Python

Discover the transformative power of Type Checking in Python and enhance your coding precision. Explore essential strategies, avoid common mistakes, and unlock …

10+ examples on python sort() and sorted() function

We can use sort() or sorted() in-built function to perform python sorting for different data types such as list, tuples, dictionaries, list of dictionaries with …

Extending Dictionary in Python [SOLVED]

A dictionary is a changeable, unordered Python container used to hold mappings between distinct keys and values. Curly brackets () are used for dictionaries,

How to slice dictionary in Python? [SOLVED]

In this article, we will see one of the most asked and confusing problems: slicing a dictionary in Python. Slicing a dictionary means obtaining the subsets of

Python add to dictionary examples (7 different methods)

In this tutorial we have explored 7 different ways for python add to dictionary with examples. You can use dict.update(), dict[key] =value, dict.setdefault(), …

Python List vs Set vs Tuple vs Dictionary Comparison

In this tutorial we do a completed detailed comparison of list vs set vs tuple vs dictionary in tabular format with practical examples

Convert YAML file to dictionary in Python [Practical Examples]

Many times in our application, we will need to write YAML file to python dictionary, or convert YAML file to dictionary in Python. We can accomplish this task

Remove key from dictionary in Python [Practical Examples]

In this tutorial we explored multiple python programming codes to remove key from dictionary (one ore more number of keys) using multiple methods.

10 simple ways to sort dictionary by key in Python

After Python 3.6, now dictionary can remember the order in which items are added. So we can easily sort dictionary by key using sorted() and many other modules …

8 simple ways to sort dictionary by value in Python

We can use different methods to sort dictionary by value or keys in Python. With Python 3.7 dictionaries remember the order of items inserted so we can use …

10+ simple examples to learn Python functions in detail

Python functions provide a way to compartmentalize your code into small tasks that can be called from multiple places within a program. The three main types of …

Pandas Pivot Simplified [In-Depth Tutorial]

Unlock the full potential of data manipulation with our comprehensive guide on Pandas Pivot. Whether you're a beginner or a pro, we cover everything from syntax …

5+ ways to merge two python dict into single expression

This is a simplest approach to merge two python dictionaries. This approach is used only if we don't mind overwriting the content of original dictionaries.

Working with different Ansible operators

Different ansible operators are arithmetic, logical, comparison and test operator which we can use with ansible playbook.

Working with Ansible conditional statements

Control structures are mainly of the following two types Conditional & Iterative. We will cover when, failed_when, changed_when conditions in playbooks

Deploy Openstack using Kolla Ansible [Step-by-Step]

Step by step instructions to deploy openstack using kolla ansible with screenshots.

How to use different Ansible variables with examples

There are different types of ansible variables such as built-in, host, group, inventory etc. There is a different procedure to access individual ansible …

Ansible roles directory structure overview | Beginners Guide

Overview on Ansible Roles Directory structure. Beginners guide to understand Ansible roles. Ansible Tutorial on role Structure with main.yml files

Ansible Block and Rescue Advanced Guide: Thank Me Later

We can use ansible block, rescue and always to perform different kinds of error handling where with the rescue block we can perform cleanup action

Steps to Create Python Web App | Python Flask Example

life cycle of creating a python web app that allows user to create, edit and delete blog posts. We used flask for the back-end, jinja2 engine that comes with …

Getting started with CGO using Visual Studio Code

Getting started with cgo language. How to use it with Visual Studio Code. Calling C code with GO or calling GO code with C. Create Hello World cgo code.

Solved: Error populating transaction, retrying RHEL/CentOS 7/8

How to fix starting package installation process error populating transaction, anaconda is retrying faced during RHEL/CentOS 7/8 installation in Linux

Setup KVM HA Cluster | Pacemaker GUI | RHEL/CentOS 8

Step-by-Step Tutorial to configure KVM HA Cluster using Pacemaker GUI (WEB UI) and CLI tool in RHEL and CentOS 8 Linux. Configure Virtual Floating IP, verify …

15 virt-install examples | KVM virtualization commands cheatsheet

virt-install examples to create KVM Virtual Machine in Linux. virt-install cheatsheet with virsh to manage the VM. Use location, PXE, custom disks, network with …

9 easy steps to create custom ISO RHEL/CentOS 8

To create custom ISO in RHEL/CentOS 8, create a kickstart file and modify the isolinux.cfg for boot menu. You can also minimze the package list and update …

How to configure VLAN with bond using kickstart in Linux (CentOS/RHEL 7)

How to configure vlan with bond using kickstart in RHEL/CentOS 7. You can configure using network --vlan or using %post section of kickstart with examples.

Kickstart %pre script examples in RHEL CentOS 7 8

Use kickstart %pre script examples to perform tasks before installing the system. Use --interpreter, --log, chroot and nochroot options with %pre script …

Setup IPv4 UEFI PXE Boot Server Ubuntu 20.04 [cloud-init]

Step by Step instructions to install and setup ipv4 UEFI PXE Boot Server for automated installation of Ubuntu 20.04 using cloud-init configuration file.

Setup PXE Boot Server using cloud-init for Ubuntu 20.04 [Step-by-Step]

Step by step instructions to install and configure PXE boot server to perform automated installation of Ubuntu 20.04 using cloud-init configuration file

Kickstart post install script examples in RHEL CentOS 7 8

Use kickstart post install scripts to perform tasks after installation, save logs, use interpreter with and without nochroot in RHEL and CentOS 7/8 Linux with …

Configure IPv6 UEFI PXE Boot with Kickstart [RHEL/CentOS 8]

Step by step instructions to install and configure IPv6 UEFI PXE Boot using kickstart configuration file. Automate the installation over IPv6 network using …

Configure IPv4 UEFI PXE Boot with Kickstart [RHEL/CentOS 8]

Step by step instructions to install and configure uefi pxe boot with kickstart on RHEL/CentOS 8 Linux. Configure DHCP for UEFI BIOS and automated installation

How to limit Kubernetes resources (CPU & Memory)

We can add a limit (quota) to different Kubernetes resources such as CPU, memory, hugepages for containers. We can restrict a soft and hard limit to these …

Journalctl cheat sheet with 10+ commands to filter systemd logs

Examples to view and filter logs, filter systemd-journald logs, linux boot messages, check systemctl logs. Complete journalctl cheat sheet, systemd logs

5 practical examples to list running processes in Linux

How to list processes by user and name in Linux? How to check if process is running by pid? How to check process status? which command is used to kill a …

CPU, processors, core, threads - Explained in layman's terms

cpu socket, processor socket, core threads, socket vs core, lscpu command explained, how to check cpu cores, how to check cpu socket, linux cpu info, how to …

Limit CPU with cgroups & slice in Linux [100% Working]

cgroup limit cpu, bash limit cpu usage, linux limit cpu usage examples. control cpu resources using slice and cgroup. restrict resources

20+ Top Open Source Application Performance Monitoring Tools (APM)

Top application performance monitoring tools, difference between application performance monitoring and application performance management. What is APM?

Sysctl Configuration for High Performance Servers

Unearth the power of sysctl for Linux server optimization. Discover essential kernel parameters, their roles, recommendations for high performance, and how to …

Advanced Tips to Improve Disk IO Performance in Linux

Explore comprehensive strategies to improve disk IO performance, from optimizing kernel parameters to leveraging virtualization tools. Unlock the full potential …

sysctl reload without reboot [100% Working]

Use sysctl -p FILE or sysctl --load FILE or sysctl --system to perform sysctl reload without reboot. Update the initramfs using dracut -f or update-initramfs …

How to create custom tuned profile in Linux ( RHEL / CentOS 7 )

Get an overview of tuned profile tuned-adm and steps to create custom tuned profile in Red Hat or CentOS 7. List tuned profiles configure own tuned profile

How to set up Java with BlueJ IDE [Step-by-Step]

In this tutorial we will cover step by step instructions to set up Java with BlueJ IDE. We will also learn to write our very first Java Program using BlueJ IDE. …

100+ Java Interview Questions and Answers for Freshers & Experienced-1

Top Java interview questions and answers for freshers and experienced users professionals. Practical and tricky coding java Interview questions and answers

Permanently disable transparent hugepages CentOS RHEL 8

Step-by-Step instructions to disable transparent hugepages GRUB2 using grub2-editenv in RHEL/CentOS 8 Linux. Check transparent huge pages status (AnonHugePages) …

3 easy steps to configure hugepages in RHEL/CentOS 7/8

Step-by-Step Tutorial to configure hugepages in red hat and centos 7/8 linux using vm nr_hugepages in /etc/sysctl.conf. Also configure hugepages pool using …

Dual boot Ubuntu with Kali Linux [Step-by-Step]

Step by step instructions to dual boot Ubuntu with Kali Linux. Choose default boot menu.

Create & Manage Striped Logical Volume Linux [Step-by-Step]

How to create striped logical volume, How to convert striped to linear logical volume and vice versa, How to extend the size of existing striped logical volume

Solved: Check thread count per process in Linux [5 Methods]

Check threads per process Check threads count per process Threads vs processes Single threaded process vs Multi Threaded process max allowed threads and process …

git prune explained [Easy Examples]

Git prune is a git function whose main purpose is cleaning stale or dormant objects from a git repository. A stale object in git becomes unreferenced and cannot …

Master the Power of Ansible Ad Hoc Commands [Tutorial]

Dive deep into the world of Ansible Ad Hoc Commands. Discover their unmatched power and versatility, and learn how to leverage them effectively for your …

Create KVM Virtual Machine using Cockpit UI RHEL CentOS 8

Step-by-Step Tutorial to create KVM Virtual Machine using Cockpit Web Console on RHEL/CentOS 8 Linux. virtual machine creation and management with Cockpit

Linux zip folder | 16 practical Linux zip command examples

How to zip a folder in Linux. How to create a zip file in Linux and Unix. Zip command examples and cheatsheet. Linux zip directory. Linux unzip to directory.

Create Stratis Snapshot, Restore Stratis FileSystem & more (CentOS/RHEL

Steps to create stratis snapshot, restore stratis file system, remove or destroy snapshot, pools, stratis file systems using examples in RHEL 8 Linux

Tutorial: How to manage docker container with examples ?

Tutorial Manage Docker Container. Download Docker Image from Docker Hub. How to connect and exit from docker container query docker hub and check logs

Essential and Useful docker logs command Tips Revealed

docker logs -f or --follow is used to monitor the logs of container with dynamic update. docker logs --tail is used to additionally limit the number of lines to …

Linux show hidden files and folders with simple commands

Linux show hidden files and folders with examples. create hidden files and folders or directories, find the hidden files and folders ubuntu, linux mint, centos

Top 15 tools to monitor disk IO performance with examples

Top and best tools to check and monitor disk IO performance with disk IO statistics and disk stats with examples. Linux disk usage with iostat, vmstat

Execute multiple commands over SSH Linux [7 Methods]

Discover how to execute multiple commands over SSH with various methods like semicolon-separated commands, double ampersand-separated commands, and more, to …

How to encrypt root partition and entire file system using LUKS in Linux

Steps to encrypt root partition and entire filesystem using LUKS in Linux. Encrypt volume group and physical volume with cryptsetup CentOS/RHEL 7/8 Migrate Data …

Shell script to check top memory & cpu consuming process in Linux

linux command to find top 5 memory cpu consuming process. how to check high cpu usage process top 10 cpu utilization process check top memory consuming process

How to install Zabbix on Rocky Linux 8 [Step-by-Step]

Step by step instructions to install and configure zabbix on rocky Linux 8

How to set CPU Affinity in Golang? [SOLVED]

There are multiple methods to set CPU Affinity in golang such as using taskset, syscall package or you can use C library inside the GO code to use …

Check if CPU supports HugePages & change default hugepage size in RHEL

Learn how to check if CPU supports HugePages with 2MB and 1GB Size in CentOS/RHEl 7 Linux and change default hugepage size permanently using GRUB2 with examples …

Python for loop (10 easy examples with syntax)

The Python for loop is also referred to as the for…in loop. This is due to its unique syntax that differs a bit from for loops in other languages. We use range, …

Deploy flask with gunicorn and nginx (Step-by-Step)

We will use gunicorn as a WSGI server to communicate with our flask app, and Nginx as a proxy server between the gunicorn server and the client.

4 practical examples - Python string replace in file

perform find and replace action string in same and different file using Python programming. Pythong string replace in a file using fileinput module.

Error: can only create exec sessions on running containers [SOLVED]

Explore solutions to the Docker error 'can only create exec sessions on running containers: container state improper.

Golang variadic function Explained [Practical Examples]

variadic function golang, pass array to variadic function golang, golang variadic function interface, golang variadic function different types, olang function …

The Dynamic Duo: Golang Arrays and Structs [Tutorial]

Discover the ins and outs of Golang arrays and structs with this comprehensive guide. Master the essentials and advanced topics like nested arrays and pointers …

Goroutine vs Threads in Golang [8 Differences]

In this tutorial we have compared goroutine with threads with all the basic differences along with practical examples

Mastering Python Nested Dictionary [Basics to Advanced]

In this python programming tutorial we learned how to use python nested dictionary for difference scenarios with examples

9 Important differences between Integer and Int in Java

The knowledge of difference between Integer and int in java is very important for a developer to know so that he can use both int and Integer classes properly …

Detailed overview on Kubernetes API Server

In Kubernetes, all communications and operations between the control plane components and external clients, such as kubectl, are translated into RESTful API …

How to export Python Data Frame to SQL File? [SOLVED]

Learn the step-by-step guide on how to export Python Data Frame to SQL file. From establishing a database connection to handling data types and performance, our …

WPScan: WordPress Vulnerability Scanner Guide [5 Steps]

WPScan is a WordPress vulnerability scanner, a penetration testing tool used to scan for vulnerabilities on WordPress-powered websites.

Perform cURL POST Request [Practical Examples]

In this article we learned how to properly perform a curl POST request with practical examples

Kubernetes Authentication & Authorization (Workflow)

Kubernetes Authentication and authorization play a very vital role in securing applications. These two terms are often used interchangeably but are very

Beginners guide on Kubernetes Pods with examples

Kubernetes Pods are the smallest deployable units of computing that you can create and manage in Kubernetes. It is a co-located group of containers and …

Steps to Install and configure Controller Node in OpenStack – Part 2

Part 2 of step by step guide to install and configure controller node in openstack. To configure controller node in openstack we will configure glance, nova

How to Build Powerful Python Custom Exceptions?

We can create Python custom exceptions by creating a new class and define the exception name and then use raise this user defined exception.

How to configure or build ceph storage cluster in Openstack ( CentOS 7 )

Step by step guide to build ceph storage cluster in Openstack CentOS 7 Linux on virtual machine. Confiure OSD, mon using ceph-deploy tool for ceph cluster

Golang cast to string from different data types [SOLVED]

golang cast to string by converting Int type to string, converting Interface type to string, converting Boolean type to string

Read file with timeout in golang [Practical Examples]

Reading and writing files are basic tasks needed for many Go programs. Reading files is one of the most essential tasks in programming. It allows us to see

How to convert Slice into Map in GoLang [SOLVED]

Explore the different methods to convert slice into map in GoLang. Learn how to handle various scenarios, from dealing with simple slices to managing slices …

Declare golang constant maps - is it possible? [SOLVED]

We can not declare constant maps directly in golang as other programming languages. In this tutorial we covered different workaround hacks to declare golang …

Golang watcher (fsnotify) Examples [In-Depth Tutorial]

In golang we have fsnotify package which can be used to monitor files and directories for any types of changes. fsnotify is not available in standard library

Start a process in background and wait Golang [4 Methods]

In this tutorial we will explore different methods and functions which we can use in golang to execute a process in background and then wait for it to complete. …

Golang Context Complete Tutorial with Examples

The golang context package is part of the standard library. It defines a Context struct type and three functions— withDeadline(), withCancel(), and …

Golang panic handing [capture, defer, recover, log]

We will cover the following scenarios in detail: How to capture a panic message FROM stderr to log file, Using defer with panic, Handling golang panics using …

Golang Channel Use Cases Explained with Examples

How to create and use golang channel. Use comma ok idiom, context, fan in and fan out with channels. Different types of channels in go with examples.

Golang Portping Magic Revealed: Beyond Basic Port Checks

Unveil the power of Golang Portping for efficient port scanning in Go. Dive deep into understanding network ports, ensuring top-notch security and streamlined …

Golang time function - Learn the Basics in Detail

golang time now, format, duration, after, loadlocation, sleep, date function explained in detail with examples

How to check Disk Interface Types in Linux [7 Methods]

how to check my hard disk is ssd or hdd. what kind of hard drive do I have. how to check ssd. how to check disk type hdd or ssd. how to check disk interface …

Dual boot Windows 10 and Linux [Step-by-Step]

Step by step instructions to dual boot windows 10 and kali linux with screenshots. Install and run both Windows 10 and Kali Linux side by side

5 tools to create bootable usb from iso linux command line and gui

Learn to create bootable usb from iso linux command line. dd iso to usb burn iso to usb linux ubuntu debian. how to make bootable pendrive in linux

Create Kali Linux bootable USB [3 Different Methods]

Different methods to create kali linux bootable USB such as Rufus, Balena Etcher, dd command in Linux

8 Common Mistakes First-Time Linux Users Make

So you've finally made the switch to Linux? Congratulations! It's like entering a new world of possibilities.

How to install Arduino IDE on AlmaLinux 8

Step by step instructions to install Arduino on AlmaLinux 8 with screenshots and examples

How to install VLC Player on AlmaLinux 8 [Step-by-Step]

Step by step instructions to install vlc player on AlmaLinux 8. Upgrade and also Uninstall VLC player.

Install Node.js on Ubuntu 20.04 [3 Different Methods]

In this tutorial we cover 3 different ways to install node.js in Ubuntu 20.04 i.e. Installing from the Ubuntu repository, Installing Node.js from NodeSource., …

How to generate cloud-init user-data file for Ubuntu 20.04 [Step-by-Step]

Step by step instructions to generate user-data (autoinstall configuration file) which will be used for automated installation of Ubuntu 20.04 using cloud- init …

How to install Zoom on AlmaLinux 8 [Step-by-Step]

Step by Step instructions to install zoom on Alma Linux 8 with screenshots

How to install Anydesk on AlmaLinux 8 [Step-by-Step]

Step by step instructions to install anydesk on almalinux 8 with screenshot and examples

How to add Network Adapter in Oracle VirtualBox

Step by step instructions to add network adapter to our existing Virtual Machine running on Oracle Virtual Box

Install Sublime Text 4 on AlmaLinux 8 [Step-by-Step]

Step by step instructions to install sublime text 4 on AlmaLinux 8 with screenshots.

Setup VNC server in Rocky Linux 8 [Step-by-Step]

Step by step instructions to setup vnc server on Rocky Linux 8 with screenshots.

Install Tor Browser on Rocky Linux [Step-by-Step]

Step by step instructions to install and configure tor browser in Rocky Linux. 2 different ways to install tor browser in Linux with screenshots

Install LEMP Stack on Rocky Linux 8 [Step-by-Step]

Step by Step instructions to install LEMP stands on Rocky Linux 8. LEMP stands for Linux, Nginx (Pronounced as Engine-X), MySQL/MariaDB, and PHP. This is a …

Install LAMP Stack on Rocky Linux 8 [Step-by-Step]

Step by Step instructions to install LAMP Stack on Rocky Linux 8. Install and configure Linux, Apache, MariaDB and PHP

Set Static IP in Rocky Linux [6 Different Methods]

6 different methods to configure and set static IP Address in Rocky Linux. Use nmtui, nmcli, ifcfg, ip and ifconfig utility to configure static IP address

5 effective ways to unlock user account in Linux

How to unlock the password for user account in Linux. If an account is locked due to login failure then use pam_tally2 or pam_fallock to unlock user account.

How to provision AWS EC2 Instances using Ansible

How to provision AWS EC2 instances using ansible playbook. Create, launch, start, stop and terminate instances using tags and instance id with ec2 module

Kubernetes Privileged Pod Practical Examples

Step by Step instructions to create Kubernetes privileged pod and Kubernetes non-privileged pod with Linux capabilities examples

6 easy steps to setup offline two factor authentication in Linux

Configure Google Authenticator with Offline two factor authentication to secure ssh, sudo and su using PAM module pam_google_authenticator.so in RHEL/CentOS 7/8 …

Linux Interview questions and answers for experienced users

Here I have consolidated 29 linux interview questions and answers for experienced professionals working into Linux or System Administrator profile.

A complete guide to write your first Ansible Playbook

Ansible playbooks are rrdered lists of tasks, saved so you can run those tasks in that order repeatedly. Playbooks can include variables as well as tasks.

4 easy methods to check sudo access for user in Linux

How to check sudo access for a normal user? Is it possible to know if a user has sudo access using a script without password prompt?

15 steps to setup Samba Active Directory DC CentOS 8

Step by Step tutorial to configure samba active directory domain controller in CentOS 8 Linux. Install Windows AD alternative in Linux. Free domain controller …

Install Airmon-ng Kali Linux [2 Methods with Examples]

Airmon-ng utility is a command-line tool used to enable monitor mode on wireless interfaces. It comes with the Aircrack-ng package.

How to exclude some accounts from being locked after multiple incorrect password

Exclude some accounts from being locked out in Linux after providing multiple incorrect password using pam_tally2 and pam_faillock insystem-auth password-auth

Steps to Install and configure Controller Node in OpenStack - Part 1

Step by step guide to install and configure controller node in openstack, configure openstack services like keystone, mariadb, rabbitmq, environment files

Know impacts of chmod 777 command [Be Cautious]

In this article we conver the impacts of chmod 777 command in Linux and how can be a threat to security. We should ideally never use chmod 777 as this is barely …

20+ AWS Interview Questions and Answers for freshers and experienced

Amazon AWS interview questions and answers. Top Amazon Web Services AWS questions and answers for freshers and experienced professionals and users scenario.

Step-by-Step Tutorial: Configure Hybrid Software RAID 10 in Linux

Steps to configure hybrid software raid 10 (1+0) in Linux with examples. Hybrid RAID 1+0 results from the combination of RAID-0 and RAID-1 Array in Linux.

Create Mirrored Logical Volume in Linux [Step-by-Step]

LVM supports mirrored volumes. A mirror maintains identical copies of data on different devices. LVM ensures that data written to an underlying physical volume …

Manage Logical Volume in Linux - One STOP Solution

The Logical Volume Manager is a collection of one or more physical devices called Volume Group (VG), each physical device on the VG called a Physical Volume …

10 easy steps to move directory to another partition RHEL/CentOS 7/8

How to move directory to another partition move opt to new partition. move home to another partition. move var to new partition in RHEL/CentOS 7/8 Linux.

Configure xfs quota (user, group and project quota) CentOS/RHEL 7/8

Configure xfs quota for user, group, projects (disk). Check and Modify XFS quota grace period. Enable and Disable XFS Quota in RHEL/CentOS 7/8 with examples

10 easy steps to setup High Availability Cluster CentOS 8

Step-by-Step Guide to setup Linux High Availability Cluster in CentOS 8 using system_id_source uname. Configure pacemaker, corosync and linux HA cluster.

Step-by-Step Tutorial: Configure software Linear RAID 0 in Linux

Steps to configure software raid with linear raid which is similar with RAID 0 but in Linear RAID the data is stored in linear format instead of stripping

Step-by-Step Tutorial: Configure Software RAID 0 in Linux

Steps to configure software raid 0 with examples in linux. With RAID 0 there is no data redundancy as the data is stored in strips but this has better speed.

Step-by-Step Tutorial: Configure Software RAID 1 in Linux

Steps to configure software raid 1 mirroring in linux with and without spare disk with examples in RHEL, CentOS and other Linux distros using mdadm.

How to mount filesystem in certain order one after the other in CentOS/RHEL

Mount filesystem in certain order during reboot one after the other using systemd unit file or /etc/fstab using RequiresMountsFor x-systemd.requires- mounts-for …

RHEL/CentOS 8 Kickstart example | Kickstart Generator

In this article I will share most used Kickstart commands to automate installation in sample RHEL/CentOS 8 Kickstart example file and link to kickstart …

Ansible Inventory files (static vs dynamic) with examples

Learn about different types of ansible inventory files, static, dynamic, create custom dynamic inventory script, groups and variables in inventory with examples …

How to add Windows Workstation to Samba AD DC (with screenshots)

Step by step tutorial to add Windows Workstation to Samba Active Directory Domain Controller and manage AD using Windows with RSAT

Install Rocky Linux 8 [Step-by-Step with Screenshots]

This guide covers how to install Rocky Linux 8.4 on VirtualBox. Rocky Linux is the replacement of the much-loved CentOS whose support will end on December 31, …

Easy steps to install multi-node Kubernetes Cluster CentOS 8

Install multi-node Kubernetes cluster using kubeadm on CentOS 8 Linux. Learn deployment architecture, with Docker CE runtime and weave networking add-on plugin

Easy steps to add node to existing cluster in Kubernetes

Install all the Kubernetes components i.e. kubeadm, kubectl, kubelet. Use kubeadm join command to add node to existing cluster in Kubernetes.

Install Kali Linux on VirtualBox [step-by-step screenshots]

Step by step instructions to install kali linux in virtualbox with screenshots. 2 different methods to install Kali Linux on Oracle VirtualBox

Create Custom RHEL ISO using Cockpit Image Builder (CentOS/RHEL 8)

Steps to create custom RHEL ISO using Cockpit Image Builder Web Console and CLI in RHEL 8 Linux. Create Live ISO, QCOW2, Amazon Machine Image, Azure Disk Img

Steps to install Kubernetes Cluster with minikube

Deploy single node Kubernetes Cluster using minikube using Oracle VirtualBox on Windows environment. The cluster node will be on Ubuntu Linux.

Connect VM to internet in Oracle VirtualBox [10 Steps]

Steps to enable and connect virtual machine to internet connection on Oracle VirtualBox and VMware Workstation Player on Linux. Configure Bridged & NAT Network

How to properly update kernel in RHEL/CentOS 7/8 Linux

Steps to update kernel properly in production environment with examples. Precautions to be considered before and after you update kernel in RHEL/CentOS 7 and 8

Step-by-Step: YUM install specific version of Package

How to yum install specific version of rpm in Linux. yum show installed packages, yum search package, install specific version of rpm with yum or dnf. yum …

Tips to check Disk Space in Linux [10 Methods]

You can use different commands such as fdisk, parted, du, df, lsscsi, lsblk, dmesg, blockdev to check disk space in Linux. Most of these commands will display …

Join Linux to Windows domain using adcli (RHEL/CentOS 7/8)

The adcli will be using System Security Services Daemon (SSSD) to connect a CentOS/RHEL 7/8 system to Microsoft Active Directory Windows Domain

6 different commands to restart network in RHEL/CentOS 7/8

The command to restart network in RHEL or CentOS 6,7 and 8 would vary depending upon your network configuration. If you are using NetworkManager then you can …

Bash while loop usage with examples for beginners

Absolute beginners guide to learn bash while loop with shell script examples. Use while true loop with break and continue statement, nested while loop, while …

5 simple methods to test ssh connection in Linux & Unix

Multiple commands to test ssh connection in Linux and Unix. How to test and check SSH connections with and without shell script examples. Check 22 port status.

KVM Virtualization | Install KVM | RHEL/CentOS 8

KVM Tutorial. Steps to install KVM (Kernel Based Virtual Machine) in RHEL/CentOS 8 Linux. Learn about KVM Hypervisor and KVM virtualization.

Helm hooks examples in Kubernetes for beginners

Helm hooks provides a means to hook into events in the release process and take action. Hooks like pre-install can be used to pass configmaps and secrets to the …

Windows Subsystem for Linux (WSL2) on Windows 10 (Step-by-Step)

Step by Step guide to install windows subsystem for Linux (WSL2) using Windows 10. Install Ubuntu on Linux using WSL.

How to suppress sysctl: reading key 'net.ipv6.conf.all.stable_secret' in Linux

Steps to suppress sysctl: reading key "net.ipv6.conf.all.stable_secret" message while running sysctl -a to grep a value from STDOUT with example in Linux

How to count occurrences of word in file using shell script in Linux

count occurrences of word in file linux. shell script to count number of words in a file. count occurrences of all words in file linux without using wc command. …

List All Active SSH connections in Linux [8 Methods]

List active SSH connections in Linux. Show SSH connection history. Show active SSH sessions in Linux using multiple commands. How to check active ssh sessions.

Shell script to check login history in Linux

linux login history. check login attempts. check successful and failed login attempts using shell script in Linux. auth log successful login. linux login audit

How to PROPERLY check memory usage per process in Linux?

Check memory usage per process in Linux using top, ps, smem tool. This will give memory usage detail of all the process / application running on Linux

How to Inject Encoded Payload [Practical Examples]

One major problem that most Ethical hackers and penetration testers face is bypassing Anti-Virus software when executing payloads. If you are running an

How to configure HAProxy in Openstack (High Availability)

Step by Step Guide to configure HAProxy in openstack i.e.High Availability using pacemaker and corosync to configure load balancer cluser in CentOS 7

How to perform Kubernetes RollingUpdate with examples

Kubernetes RollingUpdate is used with deployments to perform updates time zero downtime by incrementally updating Pods instances with new ones.

4 useful methods to automate ssh login with password in Linux

How to automate SSH login with password? How to pass password to scp command used in bash script ? How to perform SSH login with password instead of using …

Configure kickstart server | PXE boot server | RHEL/CentOS 8

PXE boot server configuration in linux step by step, kickstart linux tutorial, configure kickstart server, network based installation in linux using kickstart

Configure vnc server in RHEL 8 Linux [Step-by-Step]

Step by step tutorial to configure vnc server in RHEL 8 Linux with examples Xvnc is the X VNC (Virtual Network Computing) server. It is based on a standard X

2 ways to update and rebuild initrd image in CentOS/RHEL 7 and 8

Steps to extract, modify, update and rebuild initrd image in CentOS RHEL 7 and 8 ISO DVD with examples using XZ / LZMA format Update initrd with modules drivers …

Perform SSH public key authentication with PSSH (without password) in Linux

Login to Linux server using SSH public key authentication for PSSH without password Linux. Generate RSA ssh key pair authorized_keys to connect using ssh- agent …

Tutorial: Encrypt, Decrypt, Sign a file with GPG Public Key in Linux

How to and Tutorial on encrypting decrypting signing message file with GPG key pair passphrase of private public key in Linux with example on command line

Simple steps to install & configure ClamAV in CentOS 7

Step by step guide to install and configure ClamAV on CentOS / RHEl 7 Linux. ClamAV is an open source antivirus tool to protect against trojan, viruses etc

How to Configure Tripleo Undercloud to deploy Overcloud in OpenStack

Step by Step guide to install tripleo (openstack on openstack) undercloud and deploy overcloud in Openstack using virtual machines on Red Hat (RHEL 7)

How to Install TripleO Undercloud (Openstack) on RHEL 7

Step by step guide to Install TripleO Undercloud and deploy Overcloud in Openstack with single compute and controller node on KVM (virt-manager) RHEL 7

5 easy steps change grub2 background image splash screen

Steps to change grub2 background image in Linux. The steps are valid for both legacy and UEFI BIOS. Use any JPE/JPEG or PNG image to set your own boot loader …

#2-ELK Stack: Enable https with ssl/tls & secure elasticsearch cluster

Steps to enable HTTPS and SSL to secure elasticsearch cluster and ELK Stack using encrypted key and certificates in Linux with examples RHEL/CentOS 7/8

Setup KVM DRBD Cluster File System Pacemaker CentOS 8

Step-by-Step tutorial to configure DRBD CLuster File System with clone using Pacemaker 2.0 on KVM Virtual Machines with RHEL/CentOS 8 Linux. Verify DRBD …

How to transfer files over SSH with SSHFS in Linux & Windows

Step-by-Step Tutorial to transfer files over SSH using SSHFS between two Linux servers or Linux and WIndows server. Copy files between linux and windows using …

How to install multi node openstack on virtualbox with packstack on CentOS

Install multi node OpenStack on VirtualBox using Packstack using CentOS 7 VM on Windows 10 laptop. Generate and configure packstack answer file for Openstack

Linux lvm snapshot backup and restore tutorial RHEL/CentOS 7/8

Step by step guide linux lvm snapshot backup and restore with examples RHEL/CentOS 7/8. Create, merge, extend, remove LVM snapshot. backup root file system

10 single line SFTP commands to transfer files in Unix/Linux

Multiple one liners SFTP commands example to copy file from remote server to local machine windows and vice versa. sftp get command examples, usage syntax

PSSH - 10 practical examples to use parallel SSH in Linux

Perform parallel ssh to execute script and function multiple Linux server using PSSH with and without password. 10 commands with examples for PSSH to perform …

Copy files and preserve permission in Golang [SOLVED]

How to copy files and preserve permission in golang.

Linux copy directory and contents from remote to local & vice versa

Rsync and SCP recursive examples to copy directory and contents. scp from local to remote server and scp from remote to local. copy file from ssh to local or …

Tutorial: Setup VNC Server CentOS 8 [100% Working]

How to setup tigervnc server on CentOS 8, Different limitations with the newly released tigervnc server package, How to connect to vnc server using vncviewer …

.bashrc vs .bash_profile [Which one to use?]

All rc files are for all shell invocations while the profiles are strictly for interactive shells. when you login via SSH, or via duplicate console, or via …

Beginners guide to install Ansible on RHEL/CentOS 8

Step by step tutorial to install ansible on RHEL 8 or CentOS 8 Linux. Configure ansible.cfg, create static inventory and run ad-hoc commands yum install ansible …

Create man page in Linux with examples (sample man page template)

Create man page using man page template with groff. Various man page examples to create table, bullet points etc. Create user specific man page in Linux.

Bash until vs while loop: Basic difference explained!

For beginners or people starting with programing language can easily get confused on which loop to use. So we will cover some examples to explain the

Steps to configure Chrony as NTP Server & Client (CentOS/RHEL 8)

Steps to configure Chrony as NTP Server and NTP Client. Monitor the NTP traffic using tcpdump. Chrony force sync with NTP Server. Check the status of NTP sync

SSH port forwarding | SSH Tunnel (Forward & Reverse)

Configure SSH Port forwarding tunneling between local and remote host in Linux. Example SSH session to forward port 8080 with ssh connection RHEL/CentOS

How to perform tar incremental backup with example in Linux

Learn about tar incremental backup with examples in Linux. You can use tar incremental backup script to automate tasks for backup and recovery in Linux/Unix

How to create anaconda updates.img used with inst.updates in RHEL 7/8

Steps to create anaconda updates.img also called as product,img with inst,updates in RHEl 7 and 8 during ISO or PXE installation Extract and rebuild updates.img …

How to clone or backup Linux partition using fsarchiver

Steps to backup partition in LInux, clone your partition or hard drive, logical volume using fsarchiver Exclude files and directories encrypt backup

Rpmbuild | Create rpm package | Build rpm from source code

Step-by-Step Tutorial to create rpm package from scratch in Linux and build rpm from source code using rpmbuild RHEL/CentOS. Make rpm package

Install Apache from Source Code Rocky Linux [Step-by-Step]

Step by Step instructions to install and configure apache from source code in Rocky Linux 8

Install OWASP Juice Shop on Kali Linux [Step-by-Step]

Step by step instructions to install OWASP juice shop on kali linux using Node.js

6 practical examples of yum history to rollback updates and patches

Detailed step by step guide to rollback yum and dnf transactions on Linux server using yum history command. You can undo, redo or completely rollback the system …

How to configure ipv6 address in Linux (RHEL / CentOS 7/8)

Configure IPv6 address using Network Manager (nmtui), CLI, Modify existing IPv6 address using nmci on Linux (RHEL / CentOS 7), Best practices for IPv6 usage

How to check and disable transparent hugepages ( CentOS / RHEL 7 )

What are transparent huge pages? How to check turn off disable transparent hugepages in RHEL / CentOS 7 Linux for this session or permanently sysctl GRUB2?

How to check Transparent HugePage status in Linux?

Steps to check transparent hugepage status with examples for AnonHugePages and Explicit hugepage (nr_hugepages) if they are enabled or disabled in RHEL/CentOS 7 …

10+ lsyncd examples to sync directories real time in CentOS/RHEL 7

Real time sync directories, delete files, exclude files from directory sync using lsyncd with rsync and rsyncssh in RHEL/CentOS 7/8 Linux with examples.

Capture ssh & sshd strace logs [Step-by-Step]

Step by Step instructions to capture SSH and SSHD strace logs with DEBUG and VERBOSE. Add timestamps to SSH and SSHD debug and strace logs

Add timestamp to SSH verbose logs [STDOUT & Log File]

Execute SSH and add timestamp to SSH verbose logs. Store the verbose logs into a log file and add timestamp prefix to each entry of log file with while loop

SSH into Docker Container [3 Simple Methods]

There are 3 different possible methods to perform docker container SSH. Using docker exec, docker attach and by running a SSHD service inside a container and …

SOLVED: SSH fails with postponed publickey error

[Solved} Steps to debug and fix postponed publickey error leading to SSH connection failure. You may also get ROOT LOGIN REFUSED, Failed pubkey, permission …

Beginners guide to use ssh config file with examples

beginners guide to learn and use ssh config file with example to define different SSH client arguments, There are different configuration files which can be …

SOLVED: Update ConfigMap & Secrets without Pod restart in K8s

In this tutorial, we'll explain how you can update the values of configmaps and secrets in Kubernetes without restarting the pods.

How to PROPERLY kill a process in Golang? [SOLVED]

In this tutorial we will cover different scenarios to kill a process using golang code. We will use different in-built functions to achieve this requirement.

How to PROPERLY Open Port in RHEL/CentOS Linux

Examples to open port in linux RHEL/CentOS 7/8 Use netstat to check port status. centos open firewall port. how to open and close ports. check if port is open

Beginners guide to mount NFS share in Linux with examples

Step by step instructions to mount and unmount NFS share in Linux with examples. How to fix umount.nfs4:: device is busy

Linux disable IPv6 properly (with or without reboot)

Detailed guide with list of best practices to disable Ipv6 in Linux. You can use grubby, grub2-editenv, sysctl to disable your ipv6 across Linux server

SOLVED: Run SSHD as non-root user (without sudo) in Linux

In this tutorial I will share the step by step instructions to run SSHD as non- root user in Linux platform. The same steps can be used for non privileged …

6 simple methods to check if ipv6 is enabled in Linux

How to check if IPv6 is enabled or disabled in my Linux server. Check for any process listening on IPv6 socket using netstat, lsof or ss command

Examples to secure Kubernetes cluster nodes (security context)

The security context can be used to enhance Kubernetes security for the cluster node by applying different policies for the pods and containers.

How to perform kubernetes health check using probes

Kubernetes performs three layer of health checks using probes. You can use readiness, liveness or startup probes with tcpget, exec and httpget methods.

How to customize cloud-init autoinstall (user-data) Ubuntu 20.04

Customize cloud-init autoinstall user-data configuration file. Configure network, assign static IPv4, IPv6 IP address, configure SSH, create bind, change …

Step-by-Step: Create LVM during installation RHEL/CentOS 7/8

Step by step screenshots to create LVM during installation using Red Hat or CentOS 7/8 ISO. how to create lvm in redhat linux 7 step by step

Beginners guide to how LVM works in Linux (architecture)

LVM stands for Logical Volume Manager which is made up of Physical Volume, Volume Group ad Logical Volume. It can be easily extended or even reduced at times

Configure Thin Provision LVM using kickstart with example in CentOS/RHEL 7/8

Configure thin provision lvm using kickstart and PXE server in CentOS/RHEL 7 and 8 Linux with examples. Define custom chunksize and metadata to create thinpool

Step-by-Step Tutorial: Configure Software RAID 4 in Linux

Step by Step Guide to configure software raid 4 in Linux using examples. RAID-4 stripes block-sized chunks of data across each drive in the array marked as ..

Steps to format SD Card in Linux [100% Working]

Step by step instructions to format SD card using 3 different methods in Linux. Using file manager, gparted and fdisk to format sd card in Linux

How to create filesystem on a Linux partition or logical volume

Steps to create filesystem on a linux partition of on a logical volume using mkfs. Create mount point and mount the filesystem to access and store the data.

5 system tools to monitor network traffic in Linux with examples

How to monitor network traffic in Linux? How to monitor application network traffic real time in Linux? How to perform speed test using command line in Linux? …

Convert double to String in Java [8 Methods]

The list below shows eight different ways in which we can convert double to string in Java. Using + operator Using String.valueOf() Using Double.toString() …

Binary Options Trading Bots: The Intersection of Finance and Programming

In the dynamic world of financial markets, binary options have carved a niche for themselves due to their simplicity and high potential returns. However, like

Python range() Function [In-Depth Tutorial]

Python range() function is a built-in function that generates a list of numbers. This list is mostly used to iterate over using a for loop.

Perform Kubernetes Autoscaling | Horizontal Pod Autoscaler (HPA)

Kubernetes autoscaling requires a metrics-server to monitor the CPU and Memory usage. Horizontal Pod Autoscaler can be used to automatically scale up and down …

Reverse Shell Cheat Sheet With Examples [100% Working]

This post will give you a detailed guide on how to create Reverse Shells with Netcat. Let’s dive in.

Setup Virtual Penetration Testing Lab [Step-by-Step]

A virtual penetration testing lab creates a safe and convenient environment for ethical hackers to sharpen their skills and test the various security tools …

How to configure PXE boot server in Linux ( CentOS / RHEL 7 )

Step by step guide to configure PXE boot server using dnsmasq, dhcp, http, tftp- server in CentOS / RHEL 7 Linux using kickstart to automate the installation

How to upgrade or downgrade virtual connect firmware in HPE using vcsu

Steps to upgrade or downgrade virtual connect firmware using VCSU in Linux or Windows with examples non-interactive. Upgrade also possible with incompatible VC. …

6 Tools making Automation Testing easy in Linux

The QA automation testing tools mentioned in this article enable the deployment of tests integrated with the DevOps workflow. They support continuous testing …

Terraform: EKS Cluster Provision on AWS [10 Steps]

This article shall cover how to deploy an EKS cluster on AWS using Terraform. There are many ways to deploy an EKS cluster on AWS such as using the web

3 simple & easy steps to install vlc player on CentOS 8

Step by step tutorial to install vlc player media on linux with and without head for both GUI and CLI mode with examples

Golang hide password input [Replace input with asterisk]

In this tutorial we learned how to hide password input using asterisk in golang using different modules.

Install Nodejs and NPM on Raspberry Pi [Step-by-Step]

Step by step instructions to install nodejs and npm on raspberry pi. 2 different methods to install and configure nodejs and npm on raspberry pi

Kubernetes SecurityContext Capabilities Explained [Examples]

Create a privileged and non-privileged container inside a Kubernetes Pod. How to add or drop all the capabilities from a Pod. How to add single or pre-defined …

5 DNS Enumeration Tools with Best Practices & Examples

5 different tools which can be used to perform DNS enumeration from WIndows or Linux. Examples and Best practices.

Install Kali Linux Apps on Ubuntu [100% Working]

Step by Step instructions to install kali linux apps on Ubuntu 20 using Katoolin. Install different tools from Kali Linux on Ubuntu.

Setup BIND DNS Server in Rocky Linux 8 [Step-by-Step]

Step by Step instructions to setup and configure bind dns server using chroot environment in Rocky Linux 8. The chroot environment is used to further secure the …

NFS mount options | NFS exports options | Beginners Guide

Linux NFS mount options example, Linux NFS exports options, root_squash vs no_root_squash, hard mount vs soft mount, Unix NFS performance. NFS mount options …

Steps to configure NFS server & client in RHEL/CentOS 7/8

Step by Step NFS configuration Guide to install and configure NFS server in RHEL/CentOS 7/8. NFS server tutorial. How to check NFS status in Linux. setup nfs …

5 easy steps to resize root LVM partition in RHEL/CentOS 7/8 Linux

Steps to resize root LVM partition. Increase or decrease root logical volume partition size with examples in RHEL/CentOS 7/8 Linux. Extend or shrink root LVM

What are GRUB Files in Linux? [In-Depth Tutorial]

Grub files, also known as GRand Unified Bootloader, are essential components in the Linux operating system that facilitate the booting process. Grub files are

SMTP Enumeration Tutorial [100% Working]

smtp enumeration oscp, smtp enumeration cheat sheet, smtp enumeration kali, smtp enumeration hacktricks, smtp enumeration nmap, smtp enumeration tools

12 steps to setup Kubernetes Cluster on AWS EC2

We will setup Kubernetes Cluster on AWS EC2 instances with controller and worker nodes. Kubernetes Architecture on AWS Cloud.

kubectl port-forward examples in Kubernetes

Use kubectl port-forward to Pods if you need to directly communicate from your local machine to a given port on the Pod. This is achieved without manually …

Set up KVM PXE server to perform network boot RHEL CentOS 8

Step-by-Step tutorial to setup KVM PXE Server to perform qemu netboot for Virtual machines. Use virt-install pxe to network boot KVM Virtual Machines in Linux

How to configure iSCSI target and initiator on CentOS/RHEL 7/8 Linux

How to configure iscsi target and initiator multipath SAN on CentOS / RHEL 7 Linux. Configure iscsi target with targetcli and initiator with iscsiadm

How to create or configure network bridge in CentOS / RHEL 7/8

configure network bridge by this step by step guide on CentOS or RHEL 7 linux, configure network bridge using NetworkManager TUI, nmtui.

Samba Active Directory Setup [Step-by-Step]

Step by step instructions to setup Samba Active Directory on Rocky Linux 8. Join WIndows Client to Samba Domain Controller

Kubernetes Networking Tutorial [Beginner to PRO]

Delve into the essentials of Kubernetes networking. Understand pod and container connectivity, learn about service types and their access modes, explore the …

Solved: DHCPDISCOVER fails with 'no free leases' in Linux

You can fix the no free leases error from DHCPDISCOVER by either add more IP address to the range or by cleaning up the lease files for unused entries

Check OPEN Ports in Linux [Like a PRO]

Use nmap, hping3 and netcat (nc) to check open ports in Linux. You can also use netcat to test firewall rules to make sure if a port is open or closed in a …

Solved: Change MAC Address in Linux [Temp & Persistent]

Step by Step instructions to change MAC address in Linux. Both temporary and permanent to survive reboot. Assign random or custom defined MAC Address with …

Get local IP Address in Linux using GO [4 Methods]

Different methods to get local IP Address in Linux using golang. Here we will explore some of the possible ways to get both IPv4 and IPv6 addresses on all

Helm Named Templates in Kubernetes [In-Depth Tutorial]

Dive deep into the creation and usage of Named Templates in Helm3. Understand how to define and call Named Templates, pass values to them, use control …

Execute long running commands over SSH [SOLVED]

Learn how to execute long running commands over SSH to manage remote systems effectively. Discover methods like nohup, setsid, byobu, and disown, and redirect …

TIPS to keep Docker Container Running? [5 Methods]

There are 3 simple methods to make sure docker container keep running. Method 1 – Build and Run the docker container in terminal mode or tty mode Method 2 – Add …

Setup Master Slave BIND DNS server Rocky Linux 8 [Step-by-Step]

Step by Step instructions to configure Master Slave BIND DNS Server on Rocky Linux 8.

Solved 'No valid host was found. not enough hosts available'

Overcloud deployment fails with error message "No valid host was found. There are not enough hosts available" in Undercloud Openstack with Red Hat.

Fail2ban SSH config on Ubuntu 18.04 and RHEL/CentOS 8

5 steps guide to Install and configure fail2ban SSH on RHEL/CentOS 7/8 Ubuntu 18 with examples. Fail2ban log rotation list banned ip firewall iptables multiport …

Configure postfix mail server and client with examples (CentOS/RHEL 7/8)

Configure postfix mail server and client using SMTP relay server. Check SMTP server configuration and connection with SWAKS. SMTP Mail Server CentOS/RHEL 7/8

A Complete Guide To Magento Security

When you dive into the realm of eСommerce, Magento is a name that frequently pops up, standing out as a cornerstone in the industry. But with great power

Step-by-Step: Upgrade multiple HPE VC firmware with SUM

Step by step guide to upgrade multiple HPE VC firmware (Virtual Connect) using Smart Update Manager. Perform parallel upgrade of the VC using SUM.

Tutorial: What is GlusterFS shared storage and types of volumes

What is GlusterFS Tutorial Replication Types of Volumes. Distributed Volume Replicated Volume. RHEL CentOS 8 glusterfs shared storage. gluster file system linux …

How to set GRUB2 password using grub2-setpassword (RHEL / CentOS 7)

Steps to set grub2 password using grub2-setpassword for unautorized modification of grub2 entries. Also steps to remove grub2 password from rhel /centos 7

How to change IO scheduler permanently in Linux

Steps to change IO scheduler permanently in Linux using tuned profile and grub2 kernel or you can change IO scheduler using /sys/block/sdX/queue/scheduler

Linux find File using the command-line [8 Different Ways]

In this tutorial we have covered 8 different methods to find file in Linux using filename, file extension, file type, file size, file's modification date, file …

Best practices to update kernel-core in RHEL/CentOS 8

Steps and best practices to update kernel-core and kernel-modules in Red Hat or CentOS 8 using yum and dnf. List and verify default kernel version

10 find exec multiple commands examples in Linux/Unix

find exec multiple commands, find exec grep print filename, find exec example, find exec with pipe, find exec with sed. find exec shell script in Linux or Unix

Commands to List Users in Linux - 100% Beginner Friendly

Multiple methods and commands to list users in Linux. 2 different ways in linux to list users with many other details

10 basic & powerful commands to check file system type in Linux/Unix

Learn how to check file system type in Linux and Unix using different commands methods. lslbk, blkid, df, findmnt and more to list and determine filesystem type …

Install Plex media server Debian 11 [Step-by-Step]

Step by step instructions to install plex media server on Debian 11 Bullseye

Install MongoDB on Rocky Linux 8.4 (Step-by-Step)

In this tutorial we will cover the steps to install MongoDB on Rocky Linux.

Integrate Samba with Active Directory (Linux & Windows)

To integrate Samba share with Active Directory we can use winbind to join Linux client with domain controller and use smbclient to access the windows share

3 easy steps to configure gmail smtp relay with postfix

Step by step tutorial to configure postfix using third party gmail smtp relay to send mails to external network. Use SASL with Google 2-Step Authentication

Install & Configure FreeIPA Server in RHEL/CentOS 8

steps to install and configure freeipa server in rhel 8 the packages necessary for installing an Identity Management server are shipped with IDM server module

What is fencing | Setup KVM cluster fencing RHEL CentOS 8

Step-by-Step Tutorial to configure cluster fencing, stonith device in RHEL and CentOS 8 Linux. Use fence_xvm to fence KVM HA Cluster nodes. Setup pacemaker …

How to list installed packages in Golang? [SOLVED]

In this tutorial we will show different methods to show where are go packages installed or to list all installed packages in golang.

6 practical scenarios to use grep recursive with examples

Perform grep recursive search for string or pattern across directories and sub directories, include or exclude certain filenames, print output with or without …

Beginners guide to Kubernetes Service Account with examples

Applications inside pods can be associated with a custom Service Account or default SA will be used. By default, pods run under the default ServiceAccount, …

Weather Data Made Easy: Mastering API Integration for Developers

Weather information is vital in our daily lives, from planning outdoor activities to making informed decisions in sectors like agriculture, transportation,

Install ELK stack on Rocky Linux 8 [Step-by-Step]

Step by step instructions to install ELK Stack on Rocky Linux. Install Elasticsearch, Logstash and Kibana

Setup Grafana with Prometheus Rocky Linux 8 [Step-by-Step]

In this guide, we shall setup Grafana with Prometheus on Rocky Linux 8, we will use Grafana instance on the same server so that we can visualize metrics …

OpenStack Interview Questions and Answers (Multichoice)

In this article I have shared multiple openstack interview questions and answers (multi choice) covering various areas of openstack project.

Create Pod Security Policy Kubernetes [Step-by-Step]

Step by step instructions to create pod security policy in Kubernetes. Verify securitycontext and linux capabilities with pod security policy

5+ practical examples to learn sticky bit in Linux

What is Unix or Linux Sticky Bit special permission. How to apply sticky bit for directories and files. What is the difference between small 't' and capital "T" …

SOLVED: Check Ubuntu Version the RIGHT WAY

6 different methods to check ubuntu version from command line terminal or graphical user interface,

Kubernetes SecurityContext Explained with Examples

To enforce policies on the pod level, we can use Kubernetes SecurityContext field in the pod specification. A security context is used to define different

Add User to Group in Linux Efficiently [5 Methods]

Discover how to add user to group in Linux using various methods like usermod, gpasswd, and adduser. Efficiently manage permissions and access control with …

Writing Ansible playbook with Visual Studio Code

We can also use virtual studio code editor to write ansible playbooks by using the ansible extension and configuring settings.json. You can use Windows or Linux …

Create KVM virtual machine | virt-manager | RHEL CentOS 8

Step-by-Step Guide to create KVM Virtual Machine using Virtual Manager in RHEL and CentOS 8 Linux. Create VM, Take Snapshot, Assign Networks using Virtual …

How to properly remove old kernels RHEL/CentOS 8

You can now use dnf command to remove old kernels from RHEL/CentOS 8 Linux. package-cleanup doesn't work any more. Use oldinstallonly with installonly_limit

Ansible Installation Guide on RHEL/CentOS 8

There are different methods using which you can install ansible using default package manager such as yum, dnf, apt, Using pip and using source compile file

Install MongoDB on AlmaLinux 8 [Step-by-Step]

Step by Step instructions to install mongodb on AlmaLinux 8. Access mongodb shell, create admin user, establish a connection with mongodb server using a …

7 tools to detect Memory Leaks with Examples

How to detect, capture and monitor memory leak in various applications such as C, C++ or in Linux process. use valgrind, core dump to capture leak information

Complete tutorial on tmux commands with examples from scratch

In this tutorial I will cover the basics of tmux from scratch using various tmux commands to create session, windows, splitting panes, killing session etc

Shell scripting Interview questions with answers

Here I have consolidated some of the basic unix/linux shell scripting interview questions with their possible answers to help you practice.

3 simple and useful tools to grep multiple strings in Linux

How to grep multiple strings and patterns in single line from a file in Linux or Unix? Is it possible to grep multiple strings using single command from a file? …

How to use 'sed' and 'awk' in Golang? [SOLVED]

In this tutorial we will cover different examples using sed and awk commands from shell into golang programming language. We have already covered exec.Command

How to find and remove duplicate files using shell script in Linux

Find duplicate files using shell script and remove duplicate files interactively, automatically by calculating hash value of all files in directories in Linux

Install DVWA on Kali Linux (Step-by-Step)

Step by step instructions to install DVWA in Kali Linux with screenshots.

Install Node.js and NPM Kali Linux [Step-by-Step]

Step by Step instructions to install node.js and npm on kali linux with screenshots. Two different methods to install node.js and NPM using default repository …

Remove Directory in Linux PROPERLY & SAFELY

In this tutorial I have shared the commands and examples to remove directory in Linux properly without loosing any data. Delete directories and sub directories …

Run Multiple Commands in Docker Compose [4 Methods]

Learn different methods to run multiple commands using Docker Compose. Understand the order of execution, output display, and handling of failures. Pass …

Add different condition in Dockerfile [5 Methods]

handle different condition in dockerfile such as docker file if else condition, arg conditions, ARG vs ENV comparison with examples

Mount ConfigMap as file in existing directory - K8s

Mount ConfigMap as file into an existing directory in Kubernetes with and without helm charts. Mount files into an existing volume inside Pod container.

Kubernetes Secrets | Declare confidential data with examples

In this article we will explore the usage of Kubernetes Secrets using some real time scenarios and examples. Ideally we use Secrets to declare confidential

12 practical grubby command examples (cheat sheet)

In this tutorial I have consolidated a bunch of grubby command examples to update, modify, add, remove kernel boot entries. Check default kernel, list of …

Ansible Vault Tutorial and Best Practices [Zero to Hero]

Unlock the potential of Ansible Vault for enhanced security and automation. Explore best practices, avoid pitfalls, and safeguard your sensitive data positively …

100+ Java Interview Questions and Answers for Freshers & Experienced-2

100+ Java interview questions and answers for freshers & experienced professionals and users. Top tricky Java interview questions with their answers

[SOLVED] Mount multiple K8 secrets to same directory

Step by step instructions to mount multiple secrets to same directory in Kubernetes. 4 different ways to mount multiple secrets to same path.

How to install Oracle Virtual Box on Linux (CentOS / RHEL 7)

Step by step Guide to install Oracle Virtual Box on RHEL / CentOS 7 Linux. To install Oracle Virtual Box you need EPEL repo. Oracle Virtual 5.2 is out now

Kubernetes ConfigMaps usage to declare env variables

Kubernetes ConfigMap decouples the application data from the application. It is used to set and define environment variables inside the Pod container. You can …

Golang Environment variables [One STOP Tutorial]

golang environment variables, golang get env variable, get env variable golang, os.getenv golang, go os getenv golang os.getenv, env golang, golang unset …

GO Cast - Perform type casting [Practical Examples]

golang cast to string, golang cast string to int, cast to int golang, golang check type of variable, go cast examples

How to check if golang channel buffer is full [SOLVED]

There are 2 different methods to check if golang channel buffer is full. Using if statement or select statement.

How to pass parameters to function in GO [SOLVED]

In this tutorial we covered different scenarios to pass parameters to golang function. Pass int, string, float as parameter or pass map and channel as parameter …

How to store values in struct using for loop in GO

In this solution we will learn how to store the values into struct using for loop in golang

Golang Read File Tutorial with Best Practices [6 Methods]

Explore the comprehensive world of "Golang Read File" with our definitive guide. Learn to master various reading methods, avoid common pitfalls, and optimize …

Getting started with GOLANG | Write your first GO Code

Getting started with go, installing go using package manager, install go-1.19, setup your own go workspace, What is GOPATH and GOROOT, How to integrate visual …

Golang return error and handle [Best Practices]

We can return errors in golanf func and then handle errors effectively using Casting Errors, Error wrapping mechanism, and Panic, defer and recover

SQL Time Functions Explained [Easy Examples]

SQL Time functions can have different versions in different Database Management Systems like MySQL, ORACLE, and MS SQL Server. NOW(), CURDATE(), CURRENT_TIME(), …

Currying Function in Java Explained [Practical Examples]

In Java, currying function is the mechanism of breaking down a multi-argument function to form the multiple functions with single arguments such that the output …

Go Anonymous Function Explained [Practical Examples]

What are Anonymous Functions in golang? Declaring anonymous function in Go Invoking Anonymous Function in Go Use variable to execute anonymous function Passing …

How to run NodeJS REPL Inside a Function [Practical Examples]

The NodeJS REPL(Read-Eval-Print-Loop) server provides a programming environment like a Linux shell where a user can evaluate JavaScript expressions and gain …

Simplifying variable scope in Golang [Practical Examples]

Variable scope refers to the particular places it is accessible from within the function or block level, a package of a given program. A package-level

How to combine two column matrices in Python? [SOLVED]

There are several methods available such as np.hstack(), np.vstack(), np.concatenate(), np.column_stack(), np.row_stack() and np.block().

Beginners Tips for Learning Python

But how do you learn Python as a beginner? Well, there are multiple ways you can go about it.

Print variable in Python like a PRO [7 Methods]

In this tutorial we will learn how to print variable in python using different methods. Use plus to concatenate strings and print them, use format strings to …

Python pass Vs break Vs continue [1-1 Comparison]

Comparison and differences between pass vs break vs continue statement in python with 1-1 comparision and examples.

Python while loop examples for multiple scenarios

python while loop, python while loop example, python exit while loop, nested while loops python, how to end a while loop in python, python infinite while loop, …

The Only OpenSSL CheatSheet You Will Need!

In this tutorial we will cover different examples using openssl command, so in short let's get started with our openssl cheatsheet.

Python if else statement usage with examples

Learn about python if else statement, nested if statement with different examples using comparison and logical operators

Python concatenate lists | combine & merge lists | 8 methods

In this tutorial we will explore different methods to combine lists in Python. This can also be referred as concatenating two or more lists, or merging multiple …

5 easy ways to concatenate strings in Python with examples

There are different methods available in Python to concatenate strings such as + operator, str.join(), format strings. The most recommended is + and += …

How to use python if else in one line with examples

Learn how to use python if else statement in one line using ternary operator. You can also hack your way to use nested if else or if elif else in single line

How to append string in Python

Python append string using different operators and functions such as str.join, + operator, += and format strings. Concatenate strings to one another.

15+ simple examples to learn Python list in detail

A list is a data structure in Python that is a mutable, ordered sequence of elements. lists are defined by having different data types between square brackets [ …

10+ simple examples to learn python tuple in detail

Python tuples are collection of comma-separated values. It is identical to a list, except it is immutable. Tuples are useful for storing information that you …

Python Tree Data Structure Explained [Practical Examples]

In this tutorial, we covered creation, insertion and traversal on python tree data structure with the sample code example. As per the requirement of an …

5 simple examples to learn python string.split()

Python split string using string.split() function. Split strings using for loop in one liner. python split string by space. python split string by comma

How to configure Openstack High Availability with corosync & pacemaker

Step by step guide to configure openstack high availability (HA) using pacemaker and corosync for openstack controller nodes with HAProxy and VIP.

How to run shell scripts in parallel & collect exit status of process

Learn to run shell scripts in parallel and collect exit code status of background processes in Linux. bash script run function in parallel wait exit code

How to create and configure network bridge using nmcli (static & dhcp)

Configure network bridge using nmcli for static and dhcp ip. nmcli connection reload. nmcli onboot. nmcli network manager centos 7. nmcli con add modify

How to enable SSH access & configure network in rescue mode (CentOS/RHEL

Steps to enable SSH access in linux rescue mode and configure network in rescue mode in RHEL/CentOS 7/8 with example transfer sosreport file inst.sshd=1

Configure LUKS Network Bound Disk Encryption with clevis & tang server

Configure Network Bound Disk Encryption (NBDE) based LUKS Disk Encryption using Clevis and tang Server in CentOS/RHEL 7/8 Linux Boot without password clevis key …

Fix 'there are no enabled repos' & create local repository in RHEL 7 & 8;

Create local repository using yum and dnf in RHEL 7 and 8 Fix there are no enabled repos Perform yum install without subscription. Create Offline yum repo Linux …

How to check security updates list & perform linux patch management RHEL

Perform Linux patch management in RHEL 6/7/8 Linux in LIVE production environment. Identify vulnerabilities list and security updates list then apply patch

Python dictionary (15 easy examples with syntax)

Python Dictionary are indexed using keys, which are usually strings. There are two kinds of dictionaries in Python: the default dict, which is unordered, and …

Create pyplot figure with matplotlib [In-Depth Tutorial]

matplotlib.pyplot is a sub-library of Python's matplotlib library that provides convenient ways to create static, animated, and interactive visualizations in

How to make circular color gradient in Python? [SOLVED]

A color gradient is a way to smoothly transition between two or more colors. A circular gradient is a type of color gradient that transitions in a circular

Python string startswith another string [SOLVED]

Use startswith() method to check if python string startswith another string or sub string. Check starting of character with char limit.

8 methods to get size of Pandas Series/DataFrame Object

In this tutorial we will cover different examples using multiple methods to get size of dataframe or series object in Pandas. Get column or rows count, entire …

Python casefold() function [Tutorial]

we seen how to use casefold function to convert all characters in a string to lowercase with four different examples

Python Set add() Examples [Tutorial]

Use python set add to Add one item to a set. We can use this multiple times to add multiple elements to set.

10+ simple examples to use Python string format in detail

There are three different style of python string formatting, % formatting, string.format() and f-strings. Add padding, whitespace, truncate texts, change …

Effective Cybersecurity Measures for Mac Owners

Use these cybersecurity measures to protect your Mac from malware. Learn the best Mac security methods and software to protect your computer from hackers.

Master SQL Mapping Cardinality: Novice to Expert

Discover the transformative power of SQL Mapping Cardinality in crafting robust and efficient databases. Elevate your database designs to new levels of …

Use Ansible Handlers Like a PRO: Don't be a Rookie

Handlers are tasks that only run when notified. Each handler should have a globally unique name. Ansible Handlers always run in the order they are defined, not …

Ansible Tags: Your Shortcut to Smarter Automation

Explore the dynamic world of Ansible Tags to streamline your automation tasks. Our guide delves into the essentials of using tags in Ansible playbooks, offering …

Print Next Word Before or After Pattern Match [SOLVED]

Print next word after pattern match last word before pattern match, everything in line after pattern match Print content between two matched pattern in Linux

5 easy steps to recover LVM2 partition, PV, VG, LVM metdata in Linux

Steps to recover LVM2 partition accidently deleted or removed. Restore PV (physical volume), restore VG (volume group) and restore LVM metadata in Linux

[5 Solutions] another app is currently holding the yum lock

With yum we get "another app is currently holding the yum lock" or "Existing lock /var/run/yum.pid: another copy is running as pid XXX". To fix this you can..

Making Sure There Is Enough Free Space on Your Mac’s Drive

There are multiple ways to deal with low storage on a MacBook’s drive such as uninstalling redundant applications, changing default download location, scanning …

[Solved] Found a swap file by the name .XXX.swp

What is .swp file? Why this file is created? How to get rid of Found a swap file by the name warning? Another program may be editing the same file. An edit …

Step-by-Step Tutorial: Install Docker on CentOS 7 with LVM Thin Provisioning

What is Docker and Docker vs Kubernetes vs Mesos container. Step by Step guide How to install Docker on CentOS 7 Linux. yum install docker centos 7

Beginners guide on Kubernetes volumes with examples

Kubernetes volume lives with a Pod across a container life cycle. After a container is restarted, the new container can see all the files that were written to …

Master Python datetime() Function: The Clock Is Ticking

In this tutorial we will learn about python datetime module which can be used to get current date and time based on different timezone. Use strptime() or …

Simple Kubernetes Helm Charts Tutorial with Examples

Kubernetes Helm Charts are package manager used to deploy charts (package). This can contain all type of resources and deploy or un-deploy them instantly. It …

Linux mount command to access filesystems, iso image, usb, network drives

Access file system by using linux mount command. Mount ISO File, USB & network Drive, List usb devices, check USB ports, Fstab options and syntax. Lazy unmount. …

Ansible Architecture

The important terminologies which we have in an Ansible Architecture are control node, managed nodes, tasks, play, playbook and many more..

How to disconnect idle ssh session or keep idle ssh session active in Linux

How to disconnect idle ssh session in Linux using ClientAliveInterval and ClientAliveCountMax. SSH close connection after sometime. How to close ssh connection

10 examples to generate SSH key in Linux (ssh-keygen)

Use ssh-keygen to generate SSH key to use public key based authentication in Linux. Create key pair with custom filename, change passphrase of existing private …

Top 5 Subdomain Enumeration Tools [Web Application Pentest]

In this tutorial article, we have learnt the top 5 tools used for Subdomain Enumeration in Web application Pentesting. All the tools in this post are very …

Powerful Pattern Matching Techniques in Python Revealed

Discover the transformative power of pattern matching in Python with our comprehensive guide. Dive into advanced techniques, avoid common mistakes, and harness …

10+ basic examples to learn Python RegEx from scratch

The re module in python regex contain different functions search, match, sub, subn, split, compile which can be used to match a pattern in the provided string.

How to HACK WiFi password [100% Working]

We will share step by step instructions to understand the different terminologies and steps involved to hack wifi password using Kali Linux.

10 practical examples of tmux configuration with examples

In this tutorial I will use tmux.conf and show different examples to modify your tmux configuration such as define custom prefix key etc

How to change LUKS device master key, cipher, hash, key-size in Linux

Steps to change LUKS device master key, cipher, key-size and hash in Linux using cryptsetup and cryptsetup-reencrypt. Backup and Restore LUKS Device

Golang convert INT to STRING [100% Working]

Discover various methods to "convert int to string" in Golang, including strconv.Itoa, strconv.FormatInt, fmt.Sprintf, fmt.Fprintf, and strings.Builder.

Bash string concatenate possible? [SOLVED]

How to concatenate strings with underscore, newline, whitespace or any other character in bash? How to append substrings in a string in bash or shell script? …

8 ways to convert long to String in Java [Practical Examples]

The list below shows eight different ways in which we can convert long to string in Java. Using + operator, String.valueOf(), Long.toString(), DecimalFormat …

Man In The Middle Attack | ARP Spoofing With arpspoof

A Man in the Middle attack is one of the most popular attacks carried on local networks. arpspoof use to perform ARP Spoofing

Beginners guide to Kubernetes Services with examples

A Kubernetes Service is a resource you create to make a single, constant point of entry to a group of pods providing the same service.

Reasons to migrate your app to AWS

If there is one thing that takes worldwide financial state, overseas supply chains and support professionals through the COVID-19 situation, it is cloud

Create Stratis File System (thin provision) with examples (CentOS/RHEL 8)

Stratis Architecture, Steps to create stratis file system with thin provision, create stratis pool, mounting stratis file system on rhel 8 linux with examples

Use SQL COUNT DISTINCT Like a PRO: Don't be a Rookie

Enhance your data management prowess by mastering SQL COUNT DISTINCT. Our comprehensive guide demystifies this powerful tool, empowering you to extract unique …

Use Triggers in SQL to avoid Database Disasters

Boost your database’s security by implementing Triggers in SQL effectively, ensuring safe and secure data management practices.

How to PROPERLY Compare Numbers or Integers in Bash

Examples to compare numbers and integers using bash shell script. You can compare variable with numbers using different methods in Linux and Unix shell

Master the Power of Ansible Roles: Don't be a Rookie

Learn to create ansible role from scratch with examples. Ansible playbook roles can be deployed using ansible handlers, tasks, defaults, templates directory

Tips and Tricks to use Unshift in Bash with Examples

Explore the transformative potential of unshift in Bash, a powerful technique to optimize array manipulations and elevate your scripting prowess. Discover how …

Cannot delete branch 'X' checked out at 'X' [SOLVED]

Explore effective solutions to triumph over the error: "Cannot delete branch X checked out at X" in Git. Empower your version control skills by learning proven …

10+ Simple Methods to get Script Name and Path in Bash

Get script name in shell script, bash get script path shell, bash get script name, shell get script name from inside the script, Linux find script location

Bash Remove Element from Array Smoothly [11 Methods]

How to remove or delete elements of one array from another array in bash with examples. Remove element from array or remove content of one array from another …

Learn ansible.cfg Best Practices: Avoid Common Mistakes

We will explore ansible.cfg configuration file used in Ansible. This file can be located at different location while the highest precedence is given to …

How to Disconnect Hung SSH Session [100% Working]

Steps to disconnect hung ssh session. Kill ssh session. Terminate stuck ssh session. Kill unresponsive ssh session. Disconnect pssh session in Linux

git HEAD~ vs HEAD^ vs HEAD@{} Explained with Examples

The tilde (~), caret(^) and at-sign(@) are reference suffixes used in GIT. Ideally if HEAD was a merge, then first parent is the branch into which we merged and …

7 Robust Methods to Convert Long to Integer in Java

Explore the insightful guide on how to convert long to integer in Java. Discover various methods, each detailed with thoughtful techniques and considerations, …

Unlock the Power of .dockerignore for Efficient Docker Builds

Unlock the full potential of your Docker builds with the power of .dockerignore file. Explore strategies and best practices to optimize, enhance, and …

Golang Switch: Robust Tool for Powerful Case Handling

golang switch case multiple conditions, golang switch case string, switch case golang break, golang switch case fallthrough, golang switch case type, golang …

Unlock the Power of Bash Getopts: The Unsung Hero

getopts is a shell builtin which is available in both the regular Bourne shell (sh) and in Bash. It is short abbreviation for "get the options" which you have …

Master the Best Techniques for Node.js Sleep [6 Methods]

Explore the ins and outs of Node.js sleep methods. Dive into best practices, common mistakes, and powerful techniques to optimize performance and efficiency in …

[SOLVED] rendered manifests contain a resource that already exists

Facing the "Error: INSTALLATION FAILED: rendered manifests contain a resource that already exists" during Helm chart installation? This comprehensive article …

Create Bash Progress Bar like a PRO: Don't be a Rookie!

Looking to enhance your shell scripts? Dive into our comprehensive guide on Bash progress bars. From basic implementation to advanced customizations, learn how …

Cannot use import statement outside a module [SOLVED]

Navigate and resolve the common JavaScript issue, "syntaxerror: cannot use import statement outside a module". Dive deep into its causes, solutions, and ensure …

5 Methods to perform String Interpolation in Java

In Java, We can perform String Interpolation in Java using several ways such as Using + operator, format function, MessageFormat class, StringBuilder class, …

Dive Deep into Dart Lists: Best Practices Revealed

Dive into the versatile world of Dart Lists as we demystify its core functionalities, revealing the transformative power it holds in modern Dart development. …

Share Data Between Pages In PageView Flutter Like a PRO

Dive into the essentials of how to effectively Share Data Between Pages In PageView in Flutter. This comprehensive guide unveils the techniques and secrets, …

Master Dart Sets: Comprehensive Guide for Developers

Dive deep into the realm of Dart sets, understanding their power and significance in modern coding. Explore techniques, best practices, and potential pitfalls …

Master the Powerful Switch Case Flutter: Ultimate Guide

Unlock the potential of the powerful switch case Flutter in development. Dive deep into best practices, common mistakes, and transformative techniques to …

Seaborn Scatterplot 101: The Ultimate Beginner Tutorial

Dive deep into the world of Seaborn scatterplot—a powerful and versatile tool for data visualization in Python. Discover its features, capabilities, and best …

Convert Decimal to Fraction [7 Programming Languages]

Discover the best techniques to convert decimal to fraction across multiple programming languages. Our comprehensive guide covers everything from basic to …

A Deep Dive into TypeScript Map: Master the Essentials

Unlock the power and efficiency of using TypeScript Map in your applications. Our comprehensive guide covers everything from basic syntax to advanced topics, …

Java Scheduler: The Unsung Hero of Backend Development

Unlock the full potential of scheduling in Java applications. From the basics to advanced techniques, our comprehensive guide covers everything you need to know …

Master Java Multiprocessing and Boost Your Skills

Unlock the full potential of Java Multiprocessing with our comprehensive guide. From beginner's basics to expert-level tips, discover how to maximize efficiency …

Master the Pandas Dropna() Method [In-Depth Tutorial]

Learn how to effectively use the Pandas dropna() method to eliminate NaN/Null values in your dataframe. Enhance your data cleaning skills now.

Unlock the Power of Python Enumerate for Efficient Looping

The Python enumerate() built-in function takes an iterable object as the input, and returns tuples consisting of a count plus a value.

Master Python Enum Classes: A Comprehensive Guide

The python enum class provides an implementation of an enumeration type, with iteration and comparison capabilities. It can be used to create well-defined …

Mastering pandas.read_csv() [Basics to Advanced]

read_csv() with first row as header, with custom index, with new column names, with skip rows, Read first N rows from csv to pandas DataFrame, Import specific …

Convert DataFrame to CSV in Python [With Best Practices]

In this tutorial we will cover multiple scenarios to convert pandas dataframe to csv file. with or without index, with oir without header, specifying column …

Transforming Academic Support with Advanced Technology

In the digital era, where everything from grocery shopping to financial consulting is available online, education technology (EdTech) has also made

Mastering JavaScript setTimeout() [In-Depth Tutorial]

The javascript setTimeout function is useful for delaying a function or code for a certain amount of time. Since JavaScript is a single-threaded language, the …

Pandas Iterate Over Rows with Best Practices [SOLVED]

We can iterate over rows in the Pandas DataFrame using the following methods, Using index attribute, Using loc[] function, Using iloc[] function, Using …

Arithmetic Operators in Java [In-Depth Tutorial]

In this tutorial, we covered all arithmetic operators supported in Java i.e. Addition Operator (+), Subtraction Operator (-), Multiplication Operator (*), …

Bash check File Exists with Best Practices [5 Methods]

In this tutorial I have consolidated a list of file test operators which can be used to check different types of files. Bash Check file exists, is a symbolic …

How to convert List to Map in Java [Practical Examples]

In this tutorial, we covered three different approach to convert List to Map in Java i.e Using the put() method, Collectors.toMap() method and …

Add Empty Column(s) to Pandas DataFrame [6 Methods]

Discover methods to add empty columns to a pandas DataFrame with ease. From using bracket notation to the assign() method, delve into the various techniques and …

Pandas to_datetime() Usage Explained [Practical Examples]

Learn about pandas to_datetime using multiple examples to convert String, Series, DataFrame into DateTime Index. Modify the output format of the to_datetime, …

How to EFFICIENTLY print entire DataFrame? [SOLVED]

In this article we discussed how to print entire dataframe in following formats: Markdown format, ,psql format, plain-text format, RST format, github format, …

7 ways to filter pandas DataFrame by column value

Learn how to filter pandas dataframe by column using various methods. Dive into Boolean indexing, the query method, string operations, lambda functions, and …

How to EFFICIENTLY use git cherry pick [Best Practices]

Explore the intricacies of Git cherry pick command: its applications, workflows, advanced use cases, and best practices. Understand how to use this powerful …

Offline Advertising Methods That Still Rule in the Digital Age

It's easy to assume that the most effective advertising strategies are online today. However, despite the popularity and convenience of digital marketing

[SOLVED] unable to delete image has dependent child images

How to fix Error response from daemon: conflict: unable to delete XXXX (cannot be forced) - image has dependent child images

Error: Cannot find module 'glob' [SOLVED]

Explore our in-depth guide on how to resolve the "Cannot find module 'glob'" error in Node.js. Learn about the common causes of this error and follow our …

How to reset index in a pandas DataFrame? [SOLVED]

The reset_index() function in pandas is a tool for resetting the index of a DataFrame to a default integer index, which is 0, 1, 2, ..., n (where n is the

How to drop rows in pandas DataFrame [Practical Examples]

In this python programming tutorial, we learned how to drop rows in the Pandas dataframe using four methods with index label and index position.

Detailed review on Movavi Video Editing Software

Read a detailed review of Movavi Video Editing Software. Find out its features, pros, and cons to make an informed decision about video editing.

Securing Cloud Storage: Challenges, Strategies & Best Practices

Explore the challenges, strategies, and best practices for securing cloud storage. Protect your data and ensure the integrity and confidentiality of your files. …

Linux Versus the World: What Makes It Stand Out Among OS

Discover what makes Linux stand out among operating systems. Explore its features, flexibility, and why it is a popular choice for developers and enthusiasts.

Language Learning Tools for DevOps, Virtualization & Security Professionals

Discover effective language learning tools and resources for professionals in DevOps, virtualization, and security roles. Enhance your communication skills, …

Golang Integer Types Explained [In-Depth Tutorial]

Explore the various "Golang integer types" like int, int8, int16, int32, int64, uint, uint8, uint16, uint32, and uint64. Learn how to choose the right data type …

Create users in bulk using shell script [SOLVED]

Learn how to create users in bulk using shell script, assign custom shells and home directories, and generate random passwords for multiple users in Linux.

Tech Savvy Students: Mastering Education with Linux Apps

Learn how Linux applications are empowering tech-savvy kids to transform the classroom. Also, understand how to use this excellent software for education.

Where to set environment variables in Linux? [SOLVED]

Discover where to set environment variables in Linux with this comprehensive guide, exploring methods for user-specific and system-wide configurations, as well …

Check Openstack version and mapped release information

Is there any single command to check openstack version or release name and how is Red Hat Openstack version mapping done.

Step-by-Step Tutorial: Install OpenStack on CentOS 7 using Packstack

Step by Step openstack installation Guide using packstack single node in centos or rhel 7 linux. Install Openstack on CentOS 7 using Packstack

How to troubleshoot OpenStack ironic introspection

Troubleshoot OpenStack ironic introspection for issues like Invalid provision state for introspection, Look up error: Could not find a node for attributes.

Solved: ironic node-delete is associated with instance

Here I have shared the steps to fix "ironic node-delete is associated with instance" where you fail to delete an ironic node accociated with an instance.

How to create and set property of flavor in OpenStack with examples

In this article I will show you the steps to create and set property of flavor with examples. Use openstack flavor set --property for existing flavors

Machine Learning in Video Games

machine learning has discovered computer video games as an interesting and rewarding area. Also, the video game market has become a prominent and proven global …

docker build --no-cache | Build docker without cache

How to build docker containers without cache using docker build --no-cache command

How to use SFTP with IPv6 Address in Linux? [SOLVED]

Discover how to use SFTP with IPv6 addresses in Linux, from configuring the SSH server to listen on IPv6 interfaces to connecting securely with the appropriate …

SQL LEFT JOIN Explained with Practical Examples

The SQL LEFT JOIN clause allows you to query data from multiple tables. It returns all rows from the left table and the matching rows from the right table.

An Overview of Online Graphic Editors

Online graphic editors have become increasingly popular in recent years, particularly as more and more people turn to the internet for their creative needs.

Difference between PDM & PLM [In-Depth Tutorial]

Product Data Management (PDM) and Product Lifecycle Management (PLM) are two essential tools for managing product development and production. Both PDM and PLM

How to use C++ WriteFile? [SOLVED]

C++ provides several file I/O functions that enable programmers to write and read data from files. One of these functions is WriteFile, which is part of the

docker stop all containers [SOLVED]

Docker is a popular open-source platform for creating, deploying, and managing applications in containers. Containers are lightweight, portable, and efficient

How to SAFELY git delete branch? [SOLVED]

You can safely delete local branch with git branch -d yourbranch. To delete a remote branch, use git push origin :mybranch, assuming your remote name is origin …

OSPF Configuration Explained on Cisco Router

Step by step instructions on OSPF configuration using Cisco router and examples

How to archive username in Java? [SOLVED]

To "archive the username" in Java means to store the username for later access and retrieval. This may mean storing the username in a variable, class field,

How to create nested directory in Golang? [SOLVED]

In this tutorial we will explore different methods which are possible to create nested directories in golang.

How to execute shell commands in Golang? [SOLVED]

In this tutorial we will cover multiple methods and scenarios to execute shell commands in golang.

Convert map to struct in Golang [4 Methods]

There are different methods to convert go map to struct, some of them are Using for loop, Using reflect package, Using json.Unmarshal() function, Using …

Convert map to JSON in Golang? [4 Methods]

In golang there are couple of methods using which we can easily convert map to JSON, some of the methods are: Using json.Marshal() function, Using …

How to configure bridged network in virt-manager (CentOS / RHEL 7)

Steps to configure bridged network in virt-manager. Virtual Machine Manager provides a graphical tool for administering virtual machines for KVM, Xen etc

How to create or configure NIC Teaming using nmcli (CentOS / RHEL 7/8)

Learn to configure NIC teaming on CentOS/RHEL 7 Linux node. RHEL 7 implements network teaming with a small kernel driver and a user-space daemon, teamd.

define ephemeral disk in OpenStack and compare with persistent storage

Define ephemeral storage. Difference between root disk vs ephemeral disk in openstack? Ephemeral storage is non persistent storage unlike cinder swift storage.

How to download entire repository from CentOS /RHEL 7/8 for offline use?

To download entire repository from CentOS / RHEL 7 you will need one time access to Internet. Next you can sync the online repository to your local system

How to download rpm package and all dependencies (RHEL / CentOS 7)

Download rpm package and all dependencies in CentOS / RHEL 7 using yumdownloader or repotrack. You can also use repoquery with yumdownloader to download rpm

How to get complete dependencies list of rpm ?

To find or get complete dependencies list of rpm you can use rpm, yum and repoquery command for both installed and non installed package

Linux Boot Process Explained Step by Step in Detail

Get detailed description of Step by Step Guide of Linux boot process with flowchart diagram. This also is the most asked question in interviews in Linux.

How to protect GRUB2 from booting kernel without password in Linux

Learn to set password to protect grub2 from booting a kernel without password. in rhel 7.To set password and protect grub2 remove unrestricted in menuentry

How to exit full screen mode in qemu virt-manager ( RHEL / CentOS 7)

How to exit full screen mode in qemu virt-manager for kvm hosts or get out of fullscreen. This article is validated on RHEL / CentOS 7 Linux on vnc viewer.

How to pass multiple arguments in shell script with examples

How to pass multiple parameters in shell script in Linux or read or pass multiple input arguments in bash shell script function in Linux using case and if.

Understanding High Availability Cluster and Architecture

Understand thearchitectecture of different kinds of cluster i.e. high performance, load balancing and high availability cluster in Red Hat Linux

How to create cluster resource in HA Cluster (with examples)

Configure High Availability Cluster and configure cluster resource and add behind the cluster in CentOS and Red Hat 7 Linux using pcs resource create..

Guide to troubleshoot Cluster Resource (RHEL / CentOS 7)

Configure high availability cluster, create cluster resource and troubleshoot cluster resource for a cluster on Red Hat / CentOS 7 with examples.

Understanding resource group and constraints in a Cluster with examples

Understand resource group and constraints with examples in Cluster. Different types of constraint, adding existing resource to group, High Available Cluster

OpenStack Command Line Cheat Sheet (Beginner's Guide)

OpenStack command line cheat sheet for begineer. This CLI cheat sheet consists of Flavor, Identity, Compute Nova, Neutron Network, Block Storage, Guestfish

How to change tmpfs partition size in Linux ( RHEL / CentOS 7 )

Increase decrease, change tmpfs partition size in Red Hat Linux 7, /run /run/user/$PID /dev/shm /sys/fc/cgroup using fstab RuntimeDirectorySize logind.conf

5 ways to check if server is physical or virtual in Linux or Unix

Commands to check if server is physical or virtual in Linux Unix. dmesg, lshw, hwinfo, dmidecode commands to check if server is physical or virtual remotely

Solved: Check if process is already running in Bash Linux

How to check if process is already running in bash Linux? Determine whether multiple instances of same script or process is still running in background?

How to set default boot kernel on Linux ( CentOS / RHEL 7 )

How to set default boot kernel in linux? Change the default boot entry for kernel ? Boot with old kernel version ? Revert to previous kernel version ?

100+ GIT Interview Questions and Answers for developers

Top GIT Interview questions and answers for developers on Linux and Windows. Here I will share list of 100 GIT Interview questions and answers Linux Windows

50 Maven Interview Questions and Answers for freshers and experienced

Top Maven interview questions and answers. Frequently asked maven interview questions and answers for freshers and experienced professionals. What is Maven?

How to install and configure two node cluster in Linux ( CentOS / RHEL 7 )

How to install configure two node cluster in linux on centos rhel 7 using vmware virtualbox corosync-quorumtool two_node wait_for_all auto_tie_breaker

How to configure HA LVM cluster resource to share LVM in Linux

How to configure HA LVM on CentOS / RHEL 7 Linux without GFS2. How can I configure cluster service or resource to activate and monitor shared LVM volumes?

How to get script execution time from within the shell script in Linux

Find out the elapsed time in minutes using bash script. Shell script execution time. Get script execution time. get command execution time in unix.

How to check if string contains numbers, letters, characters in bash

Check if string contains numbers check if string contains alphabets numbers check if string contains characters, string contains vowels Bash Compare strings

Difference between /dev/tty and /dev/pts (tty vs pts) in Linux

What is the difference between /dev/pts and /dev/tty. Why do I get /dev/pts instead of /dev/tty on my Linux terminal. TTY vs PTS. /dev/tty vs /dev/pts.

How to disable tty or enable tty console in Linux ( RHEL / CentOS 7)

How to enable tty for more than 6 console. How to disable all the tty terminals in Linux. systemd disable tty. systemd enable tty using getty service in Linux.

Step-by-Step Tutorial: Configure Software RAID 5 in Linux

Steps to configure software raid 5 array in Linux using mdadm. RAID 5 is similar to RAID-4, except the parity info is spread across all drives in the array.

Solved: Add thousands separator comma in number [Linux Bash]

Sample script to add thousands separator using comma in a number (integer or decimal) using shell or bash script in Linux with examples.

SHELL/BASH: How to create an interactive calculator in Linux

Sample shell script to create an interactive calculator using bc command to perform add, subsctract, multiply. divide, sine, cosine etc mathematical function.

Calculate Loan EMI Amount in Bash script Linux

Calculate loan EMI amount, interest and principle using bash or shell script in Linux with example. The script can be created online and runtime value.

How to boot Linux host from LVM snapshot using BOOM (CentOS/RHEL 8)

Step by Step guide to boot CentOS/RHEL 8 or 7.5 and higher Linux with LVM snapshot using BOOM. with examples. Merge LVM snapshot and delete boom profile later.

Step-by-Step Tutorial: Configure Master Slave DNS Server (RHEL/CentOS 7)

Steps to configure master slave dns server using bind chroot environment in RHEL/CentOS 7 Linux. Sample master dns server and slave dns server with examples.

Secure Master Slave DNS Server with DNSSEC key in Linux (RHEL/CentOS 7)

Steps to secure master slave dns server using various algorithm types to secure the data replication between master and slave dns server using dnssec key Linux

Register RHEL 7 host to RHN using subscription manager (with or without proxy)

Register RHEL 7 system to Red Hat Satellite Network using subscription manager. Attach pool, enable and disable repositories with or without proxy in RHSM.conf

Unregister RHEL 7 using Subscription Manager and Remove System Profile

Unregister RHEL 7 from Red Hat Network using subscription manager and remove system profile. subscription-manager unregister, clean to remove subscription data

8 ways to prevent brute force SSH attacks in Linux (CentOS/RHEL 7)

Prevent brute force SSH attacks in RHEL CentOS 7 with examples using Fail2ban, account lockout, SSH rate limit using iptables, sshd_config, SHA512 hashing

6 ssh authentication methods to secure connection (sshd_config)

Overview on different openssh authentication methods using sshd_config in RHEL/CentOS 7/8 Linux with Examples. Authenticate your sshd connection in Linux

Overview on different disk types and disk interface types

different disk types, different disk interface types. HDD vs SSD vs Optical Disks. Learn all about SCSI, IDE, ATA, SATA, Fibre Channel disk interface types

Tutorial: Beginners guide on Linux Memory Management

Understand various terminologies with linux memory management, dirty page, swapping, inactive, active memory, Translation Lookaside Buffers (TLB), page cache

SOLVED: How to return multiple values in GoLang func()

In this article, we are discussing how to return multiple values using a function in Go.

Solved: Call function from another package in GO

golang call function from another directory, call function from same package golang, golang call function from another package, how to call another function in …

SOLVED: Golang access variable from another package

golang access variable from another package, golang global variable, golang global variables across files, golang export variable from package, golang not …

3 ways to read file into variable in Golang [SOLVED]

We will cover following 3 methods which can be used to read file and store content into a variable in go i.e. go:embed, ioutil.ReadFile(), os.Open()

Golang string to uint8 type casting [SOLVED]

We can use strconv.Atoi, fmt.Sscan, and strconv.ParseInt functions for golang string to uint8 type casting.

Delete elements from slice in GO [SOLVED]

Delete elements from slice in golang, first n elements, last n elements, without maintaining the order, maintain the order, delete random elements

Understand the Concept Of The Internet Market Share

As of April 2022, statistics show that about 63.1% of the world's population have access to the internet and are frequent users. This number is expected to

How to rename docker container? [SOLVED]

You can rename docker container in two ways. Rename a container by the name Rename a container by ID

DevSecOps vs DevOps - Explaining the Difference

Although DevOps has been serving a phenomenal role in development processes for many years, it's been lacking one small aspect - security. Therefore DevSecOps

Golang Benchmark and Testing [Step-by-Step]

Step by step instructions to perform golang benchmarking and testing

How to find length of Set in Python? [SOLVED]

Use len() function to check length of a set in Python

16 Linux ip command examples to configure network interfaces (cheatsheet)

Assign IPv4 and IPv6 IP Address using ip command to network interface. Add/Replace/Delete default routes. Modify network interface properties with examples

Python while loop with multiple conditions [SOLVED]

Using python while loop with multiple conditions in single or nested loop with examples.

SOLVED: Calling a function from another file in Python

In this scenario, we are calling a function from another file in different directory. Let us save the file compute.py inside the folder bank. Whereas, demo.py

How to Logout from Docker Registry? [SOLVED]

Steps and Best Practices to logout from docker regsitry.

How to Override the Entrypoint in Docker? [SOLVED]

We can use docker run command to override the entrypoint or the cmd values which are provided during image building inside Dockerfile.

SQL INNER JOIN Explained with Simple Examples

The SQL INNER JOIN clause allows you to query data from multiple tables. It returns all rows from Table1, Table2, and Table 3 so on with exact matching rows …

SQL Date Functions Explained with Practical Examples

Different types of SQL Date Functions explained with examples. Some SQL Date Functions are similar in most database management systems. Few SQL Date Functions …

Using docker ps -a to list all the containers [SOLVED]

docker ps -a is used to show both the stopped and running docker containers.

docker run -i command examples

Use docker run -i command to run the container interactively

Understanding Docker Vs Containerd

Container execution is handled by containerd. You can think of it as a container supervisor that handles container lifecycle operations.

Docker Restart Container [Control With Flags]

Docker restart container using various flags to control the restart behavior of the container

PodDisruptionBudget in Action with Examples

PodDisruptionBudget ensures a certain number or percentage of Pods will not voluntarily be evicted from a node at any one point in time

Golang Escape Backslash [100% Working]

We can either use additional backslash to escape backslash or raw string literals to convert entire text to string.

How to parse multiple inputs from user in Golang

The following are functions used to read or parse users' inputs in Golang:- fmt.Scanln(), fmt.Scanf(), bufio.NewReader(). These functions can parse single or …

Golang remove duplicates from slice with Examples

remove duplicates in slice golang, find unique elements in array golang, golang count occurrences in slice, find duplicates in array golang, Remove duplcate …

How to Become a Mobile App Developer

The 21st century is the era of multifunctional gadgets. Today, it is difficult to find a person who uses a push-button telephone. Smartphones have long since

Why Application Support Services is Important

Information technology is currently at the center of driving business growth and performance hence the need to implement them. However, businesses may not

DRBD Tutorial | Setup Linux Disk Replication | CentOS 8

Step-by-Step DRBD Tutorial to install and configure DRBD Storage device on CentOS 8. Perform Linux disk replication runtime. How to perform DRBD configuration

2 ways to boot with old kernel version in RHEL 8 using grubby

Steps to set default boot kernel in RHEL 8 using grubby and boot with old kernel version. Check the kernel version which will get activated after reboot

How to configure ssh host based authentication per user (CentOS/RHEL 7/8)

Configure SSH Host Based Authentication using sshd_config, shosts,equiv per user RHEL/CentOS 7/8. Compare Host based authentication vs public key authentication …

#1-ELK Stack: Configure elasticsearch cluster setup CentOS/RHEL 7/8

Elasticsearch Tutorial on ELk Stack to configure elasticsearch cluster in RHEL/CentOS 7/8 Linux with examples. Get cluster helath status, node types, stats

Install & configure glusterfs distributed volume RHEL/CentOS 8

Steps to install and configure glusterfs distributed volume on two cluster nodes with RHEL/CentOS 8. GlusterFS Tutorial with shared storage Red Hat/CentOS 8

Configure glusterfs distributed replicated volume RHEL/CentOS 8

Steps to install and configure shared storage with glusterfs distributed replicated volume in RHEL/CentOS 8 Linux. Configure Red hat Storage in Red Hat 8

Install & configure glusterfs replicated volume RHEL/CentOS 8

GlusterFS Tutorial to install and configure glusterfs replicated volume shared storage with redundancy in RHEL/CentOS 8 Linux GlusterFS Replication Volume Type

How to Compare Strings in Bash

How to compare strings in shell script in Linux and Unix. perform regex and pattern match or strings and sub strings. Learn about different comparison operator

How to create, read, append, write to file in Python

use open() or with open() function with different modes to create, write, append content to a text or binary file. Python write to file by overwriting the …

4 practical examples with bash increment variable

How to increment variable in bash shell script? How to add 1 to a variable for every for loop? How to increment counter in bash? How to perform bash variable …

Configure Pod storage with Kubernetes Persistent Volume (PV)

A Kubernetes Persistent Volume (PV) is a piece of storage in the cluster that has been provisioned by an administrator or dynamically provisioned using Storage …

Beginners guide on Kubernetes StatefulSets with examples

A Kubernetes StatefulSet makes sure pods are rescheduled in such a way that they retain their identity and state. It also allows you to easily scale the number …

Beginners guide on Kubernetes RBAC with examples

The Kubernetes API server can be configured to use Role Based Access Control (RBAC) to check whether an action is allowed to be performed by the user requesting …

Steps to perform Kubernetes upgrade version (without downtime)

Steps to perform kubernetes upgrade version requires updating controller followed by worker node. Update kubeadm and drain the node.

git reset examples [hard vs soft vs mixed]

The git reset command changes your repository and working directory to a known state. Specifically, git reset adjusts the HEAD ref to a given commit, and by …

.gitignore examples to ignore files, folder & pattern

The .gitignore is a file containing a list of files or folders that allows you to command Git to pass over/ignore in the local repository while pushing commits. …

git fetch vs git pull Explained [With Examples]

git pull performs both git fetch + git merge without any user prompt. git fetch wil only fetch the reefs and tags from remote repo but will not merge them to …

git pull force Explained [Easy Examples]

A git pull force procedure enables an update to a local repository with remote content even when you have pending commits.

List vs LinkedList in Java Explained [Practical Examples]

In Java, List is an interface in java.util package whereas LinkedList is a class in the java.util package. Both of this data structure is used to store the …

LinkedList in Java Explained [Complete Tutorial]

In Java, the LinkedList class is a member of Java Collections Framework present in java.util package. This class implements List interface along with other …

ArrayList vs LinkedList in Java [Practical Examples]

The ArrayList class implements a List Interface. So, this acts as a list. While the LinkedList class implements both List and Deque Interface. So, this acts as …

HashMap vs Hashtable vs HashSet in Java [Practical Examples]

HashMap is hash table based implementation of Map interface, Hashtable class implements a hash table, which maps keys to values. HashSet is a hash table based …

CopyOnWriteArrayList Class in Java [Complete Tutorial]

In this tutorial, we covered constructors and methods of CopyOnWriteArrayList class along with the important operations that can be performed using the built- …

Deploy multi-node K8s cluster on Rocky Linux 8 [Step-by-Step]

Step by step instructions to setup and deploy multi-node kubernetes cluster on Rocky Linux 8 using containerd and calico CNI

Beginners guide to use script arguments in bash with examples

How to pass and store arguments to shell script? How to parse input arguments inside shell script? How to pass arguments to a function inside shell script in …

Shell script to resize image, convert image format in Linux

Steps to convert image format, resize image percentage, scale using imagemagick in linux. shell script to batch resize image and convert image format in linux.

How to set up WordPress Reverse Shell [100% Working]

Step by Step instructions to setup wordpress reverse shell using 3 different methods. Setup reverse shell using metasploit framework, vulnerable plugins, …

How to Compute Square in Java [Practical Examples]

There are four different ways to compute square of a number in Java, Using multiplication operator *, Using Math.pow() function, Using BigInteger.pow() …

How to capture serial console dump from HPE iLO4 using VSP (with screenshots)

In this article I will share the steps to capture serial console dump from iLO4 using VSP with screenshots which can help you troubleshoot RSOD issue in BIOS

How to update GRUB2 using grub2-editenv and grubby in RHEL 8 Linux

Set and Modify kernel command line arguments, update GRUB2 in RHEL 8 using grub2-editenv, grubby and grub2-mkconfig with examples to disabled IPv6 RHEL 8 Linux

How to check and set Java timezone (update tzdata for openJDK) using tzupdater

Steps to set java timezone using tzupdater update tzdata for openjdk in CentOS RHEL SLES. Check current tzdayta version in JRE java -jar tzupdater.jar -V

How to resize LUKS partition (shrink or extend encrypted luks partition) in

You can resize LUKS partition in Linux. Shrink or Extend encrypted LUKS partition and logical volume in CentOS/RHEL 7/8 Linux. Shrink LUKS encrypted partition

How to prevent user from using old password (or re-using) again in Linux

How to prevent user from using old password or reusing old password while providing new password in CentOS/RHEL 7 Password has been already used. Choose another …

Steps to join/add CentOS 8 to Windows Domain Controller (RHEL 8)

Step by step tutorial to join or add CentOS 8 to Windows Domain Controller running on Windows Domain Controller Active Directory on 2012 R2 using winbind RHEL 8 …

How to generate sosreport in rescue mode on Software RAID (RHEL/CentOS 7)

How to generate sosreport in rescue mode linux. Fix sosreport command not found. Boot using RHEL/CentOS DVD to rescue mode in linux with software raid linux

How to configure port forwarding in VirtualBox for NAT Networking

Configure port forwarding in virtualbox NAT Networking using command line CLI using VboxManage GUI. ssh into virtualbox from windows port forwarding computer

Configure FTP server and pam.d to authenticate users with AD (CentOS/RHEL 7/8)

Configure FTP Server and authenticate users from Active Directory for VSFTPD server in CentOS/RHEL 7 and 8 Linux. Connect FTP Server from AD user in Linux

9 commands to check if connected to internet with shell script examples

commands to check if connected to internet using Linux. Validate internet connectivity with examples using shell bash script in Linux. Check port availability.

How to check Transparent HugePage usage per process in Linux with examples

Steps to check transparent hugepage usage per process in Linux with examples. Calculate Transparent HugePage (AnonHugePages) system wide processes in Linux

Golang function vs method Comparison with Examples

golang receiver vs function argument, golang receiver vs function argument, golang when to use methods, method and function in golang, golang instance function, …

NumberFormat Class in Java Explained [Practical Examples]

Some of the task performed by the NumberFormat class in Java are Formatting Numbers, Setting number of Digits in Fraction part, Rounding Numbers, Formatting …

Golang Closure Function Tutorial [Practical Examples]

learn about the basics of golang closure function, how it is related to anonymous function. When should you use and how to use closure function in go code

How to check last password change date of user in Linux/Unix

check last password change date in Linux check password expiration, check password status of system and active directory user. chage command examples.

How to PROPERLY boot into single user mode in RHEL/CentOS 7/8

linux single user mode, centos 7 single user mode, rhel 7 single user mode, single user mode linux, how to boot into single user mode linux, centos single user …

Getting Started with Git Basics | Version Control

In this Git tutorial we covered the git basics where we learned about version control, different types of version control, what is git and it's capabilities.

Bash Function Usage Guide for Absolute Beginners

How to define bash function, pass command line arguments to a function and store it as variable or array, Use return value to return different exit codes from …

How to read json data format in Go [Practical examples]

We shall discuss the following:- What is JSON? Read JSON Data to map Read JSON Data to struct Save JSON Data Using Marshal() (converting from a Go data type to …

How to assign Pods to Nodes | Kubernetes Node Affinity

In this tutorial we'll show how we can use node affinity to schedule application pods as per our needs.

Create custom GO module with Examples [Step-by-Step]

Now, we will create an example Go module. We will call it GoLinuxCloud. First, we need to create a folder inside the GOPATH src directory. Now, we need to

5 ways to check if a string is an integer in Python [Practical Examples]

When operating with numbers and strings, many times while fetching the data from the text box, we fetch it as a string. Now, on back-end this data may be

Kubernetes subPath Examples | MountPath vs subPath Explained

The Kubernetes subPath property prevents overwriting of existing data by mounting a single file from the volume instead of mounting the whole volume. We'll

Different Kali Vulnerability Scanner Tools [Explained]

Kali Linux is one of the most popular Linux distributions used for Security auditing and Penetrations testing. It comes pre-installed with numerous (300+)

How to Paginate with Mongoose in Node.js [Practical Examples]

It is a traditional way to paginate with mongoose. Here, It simply uses limit and offset in SQL queries to paginate the data from database. If you are working

Complete Shodan Tutorial | The Search Engine for Hackers

Shodan is a search engine but very different from regular search engines like Google, Yahoo, Bing, etc., which search the web for standard websites. Shodan

How to implement Binary Search Tree in Python [Easy Examples]

The knowledge of how to implement binary search tree in Python is very useful while working on real time applications. In many situations, we will need to

How to implement 3 stacks in an array [Practical Examples]

A Stack is a Last in First out(LIFO) data structure. Push and pop operations are used for insertion and deletion of a value from the stack respectively. In

Find merge point of two lists in Java [Practical Examples]

In this article we explored three different methods which can be used in Java to find merge point of two lists i.e Brute Force Approach, Marking Node as visited …

How to find a height of a tree data structure in Java

The Tree is a non linear data structure consisting of nodes and edges. Depending upon the type of tree, it can have 0 or more child nodes. There are two ways to …

4 ways to convert char to int in Java [Practical Examples]

In this tutorial, we covered four different approaches to convert char to int in Java, Using ASCII Values, Integer.parseInt() method, …

How to get sublist from a list in Java [Practical Examples]

In order to get sublist either in an ArrayList or LinkedList, we have to use the sublist() method which is a method of AbstractList class.

How to split String into Array [Practical Examples]

In this tutorial we will cover multiple examples to understand how to split string into array for different scenarios

How to return an Array in Java [Practical Examples]

There are three different ways to return an array from a function in Java as listed below: Return an array of primitive type, Return an array of objects, Return …

How to convert Set to list in Java [Practical Examples]

There are several ways to convert the set to list in java as listed below. Using looping, ArrayList Constructor, LinkedList Constructor, List.addAll() Method, …

How to convert String to Date in Java [Practical Examples]

There are five ways to convert a String to Date in java as listed below. Using SimpleDateFormat Class, LocalDate Class, DateTimeFormater Class, Instant Class, …

How to Compare Characters in Java [Practical Examples]

There are several ways to compare characters in java as listed below, Using Relational Operators, Using Character.compare(), Using Character.hashCode(), Using …

6 ways to implement Hashing in Java [Practical Examples]

In this tutorial we cover following 6 different methods to implement hashing in java. Using Hashtable Class, HashMap Class, LinkedHashMap Class, …

How to Copy a File in Java [Practical Examples]

The list below shows five different ways in which we can copy a file in Java. Using FileInputStream and FileOutputStream Using Paths and Files Using …

How to check if file exists in Java [Practical Examples]

In Java, there are three different ways to check if file exists or not such as Using exists method of Legacy I/O File class, Using isFile method of File class, …

How to get Current Date in Java [Practical Examples]

The list below shows eight different ways to get current date in Java Using java.util.Date, java.util.Calendar, java.time.LocalDateTime, java.time.LocalDate, …

How to reverse a list in Java [4 Different Methods]

We can reverse a list in Java using four different ways i.e. Using add and remove method, Using recursion, Using reverse method of Collections, Using …

Return Multiple Values in Java [5 Different Methods]

We can use any of the five shown approaches as per the program requirement to return multiple values in Java. Return an array of specific type or object, Return …

SOLVED: How to PROPERLY rename file(s) in Linux

There are multiple ways in Linux to rename single or multiple files using one line commands or in script

SOLVED: Check if path is subdirectory of another in Node.JS

In this tutorial we learned how to check if path is subdirectory of another directory using Node.JS. Tutorial on NodeJS Path module.

Setup local YUM/DNF repo server Rocky Linux 8 [Step-by-Step]

Step by Step instructions to configure local and offline yum or dnf repository server using Nginx on Rocky Linux 8

Node.Js forEach() statement Explained [Practical Examples]

In this article, you learned how you can use the Node.Js forEach() to iterate over an iterable in JavaScript. When iterating over array elements, you should opt …

Steps to expose services using Kubernetes Ingress

Kubernetes Ingress provides a granular mechanism for routing requests into a cluster. Ingress does not replace Services but augments them with capabilities such …

3 different ways to detect a loop in a Linked List

There are three ways to detect a loop in a linked list cycle. They are as listed below. Traversing through the list, Using HashSet, Using Floyd's Cycle …

How to use pandas.Series.map() [Practical Examples]

The pandas.Series.map() performs the mapping by first matching the values of the outer Series with the index labels of the inner Series. It then returns a new …

How to set up Java with Visual Studio Code [Step-by-Step]

Step by Step instructions to set up Java with Visual Studio Code. Create and compile your first Java Program using VSC.

How to set up Java with Eclipse IDE [Step-by-Step]

Step by step instructions to set up Java with Eclipse IDE. create your first Java program using Eclipse and execute the same.

8 different ways to use assert in Node.js [Practical Examples]

The purpose of the assert module in Node.js is to provide various ways of asserting functions. For instance, if the assertion. It is used to test the …

Let's explore pandas.DataFrame.resample with Examples

In this tutorial we explain usage of pandas resample using multiple methods and examples. Frequency conversion provides basic conversion of data using the new …

5 ways you can create histogram using pandas DataFrame

In this tutorial we learned to create histogram in Pandas with following parameters, with specific size, with number of bins, Histogram with specific color, …

Learn to use pandas.unique() with Series/DataFrame

unique() function is used to get the distinct / unique data from Series/DataFrames. It can be applied on the columns in the dataframe. The unique() method …

Pandas DataFrame.rolling() Explained [Practical Examples]

Pandas rolling() function is used to provide the window calculations for the given pandas object. By using rolling we can calculate statistical operations like …

Exploring pandas melt() function [Practical Examples]

Pandas melt() function is used to unpivot a DataFrame from wide to long format, optionally leaving identifiers set. A pivot table aggregates the values in a …

4 different ways to read JSON file in NodeJS

In this tutorial we will cover following methods to read JSOn file in NodeJS; Using fs module, require function and third party NPM libraries such as jsonfile …

Convert list of dictionaries to DataFrame [Practical Examples]

Pandas convert list of dictionaries to ataframe using pandas.DataFrame(), pandas.DataFrame() with index, pandas.DataFrame() with index and columns, …

Compare loc[] vs iloc[] vs at[] vs iat[] with Examples

In this article we will cover different examples to understand the difference between loc[] vs iloc[] and at[] vs iat[] in Python pandas

How to change the order of Pandas DataFrame columns

how to change the order of columns in panads dataframe using the following methods, Using reindex() function, sort_index() function, indexing or Move columns to …

How to count rows in a pandas DataFrame [Practical Examples]

In pandas we can count rows Using axes() function, shape() function, index Using info() method, len() function, count() function, value_counts() function

Different Nested Loops in Java Explained [Practical Examples]

Java supports following nested loops: Nested for loop, Nested while loop, Nested do-while loop explained with practical examples

4 ways to drop columns in pandas DataFrame

Following methods can be used to drop columns in pandas dataframe: Using drop() method, using drop() with columns method, using drop() with loc[] method, using …

6 ways to select columns from pandas DataFrame

Select column using column name with "." operator or []. Get all column names using columns method or using info() method. Describe the column statistics using …

5 ways to select multiple columns in a pandas DataFrame

Pandas select multiple columns using column name with [], columns method, loc[] function, iloc[] function, drop() method

6 ways to add column to existing DataFrame in pandas

In this tutorial we covered following methods which can be used to add column to existing dataframe using [] with None value, [] with Constant value, [] with …

7 ways to convert pandas DataFrame column to float

In this article we covered multiple examples to convert different types of column to float type in pandas DataFrame

7 ways to convert pandas DataFrame column to int

In this article we covered multiple examples to convert different types of column to int type in pandas DataFrame

Accessor and Mutator Methods in Java [Practical Examples]

The knowledge of Java Accessor and Mutator is very useful as it implements encapsulation, which is one of the important feature of Object oriented Programming.

How to bypass CSRF Protection [5 Different Methods]

In this article, we have learnt about what is an CSRF attack and how we can use CSRF attacks to exploit and also bypass CSRF protection.

How to Parse CSV Data in NodeJS [Practical Examples]

In this article, you learned how to parse CSV data in three ways. The first method reads the whole string then splits it into rows and columns.The second method …

Top 5 Best Practices for Containerized Deployments

Even though containers are valuable in the current software development trends, realizing containerized deployments in organizations is not easy. This article

Unary Operators in Java Explained [Practical Examples]

SUpported Unary operators in java are Unary Plus Operator(+), Unary Minus Operator(-), Logical NOT Operator (!), Increment Operator (++), Decrement Operator …

Logical Operators in Java Explained [Practical Examples]

Logical operators in Java can be divided into, Logical OR Operator(||), Logical AND Operator(&&), Logical NOT Operator (!)

Bitwise Operators in Java Explained [Practical Examples]

Bitwise operators in Java are binary operators that works on bits to perform its operations. Java supports the following Bitwise operators: Bitwise OR …

Relational Operators in Java Explained [Practical Examples]

In this tutorial, we covered all relational operators in Java. We learned in detail about the syntax and how we can use this operators with different data types …

100% proven ways to find hidden endpoints [Tutorial]

There are various methods to find Hidden endpoints: Google Dorks Github Archive’s Apk’s JS Files

Use Burp Suite Proxy to Intercept Network Traffic [Step-by-Step]

Step by step instructions to setup and configure burp suite proxy to intercept network traffic with examples.

Getting started with Terraform - Tutorial

Step by step instructions to install terraform on Ubuntu. Deploy AWS EC2 Instance (Infrastructure) using terraform with screenshots and code examples.

Install GCC on Rocky Linux PROPERLY [Step-by-Step]

step-by-step guide to install GCC on Rocky Linux. We also went further and wrote a C program to add two numbers, and further looked at how GCC carries out …

How to PROPERLY test port connectivity in Linux

Multiple methods and commands to test port connectivity between Linux server and client with examples. Check availability of multiple ports in Linux for …

Metasploit Tutorial on Kali Linux [Step-by-Step]

Step by step instructions in the tutorial to install and use metasploit framework on kali Linux

DVWA SQL Injection Exploitation Explained (Step-by-Step)

SQL injection proves to be a critical vulnerability that can exist in a system. The DVWA acts as a reliable resource for both penetration testers who want to …

Password Cracker - John The Ripper (JTR) Examples

John The Ripper (JTR) is one of the most popular password cracking tools available in most Penetration testing Linux distributions like Kali Linux, Parrot OS, …

Install Kali Linux on Raspberry Pi [Step-by-Step]

Step by Step instructions to install and setup Kali Linux on Raspberry Pi 2,3 and 4 with screenshots.

Kali Linux Repositories Explained [With Examples]

Kali Linux repositories are found in the /etc/apt/sources.list file. There are 3 different branch i.e. Kali-rolling branch, Kali-last snapshot branch, Kali- …

How to use Jinja2 templates in Ansible with examples

Jinja2 is a very popular and powerful Python-based template engine. Jinja2 templates is widely used in Ansible playbook to access variables, configuration etc

Pre-requisites to setup Ansible

To configure ansible we need certain pre-requisites. For example control node cannot be a windows node, We need SSH access on the managed node and python3 must …

Install iRedMail on Rocky Linux 8 [Step-by-Step]

Step by Step instructions to install iredmail on rocky linux 8 with screenshots. Install and Configure iredmail server GUI

SQL RIGHT JOIN Explained with Examples

The SQL RIGHT JOIN gives all the matching rows plus to the left table and all the rows in the right table which are not in the left table.

Check Kubernetes Cluster Version [5 Methods]

In this tutorial I will share multiple methods and commands to check Kubernetes Cluster Version in a Kubernetes Cluster.

Add timestamp to SSHD DEBUG logs [100% Working]

Add timestamp to SSHD DEBUG logs using while loop. Prepend timestamp to STDOUT and log file for DEBUG logs

git push force Explained [With Examples]

git push force is used to overwrite commits on the remote repository. Alternatively we can use git force with leave to make sure commits are not overwritten

How to add label to running pod in Kubernetes

There are two methods to add label to running pod in Kubernetes. Using kubectl label pods or kubectl edit command to edit a resource object.

Install WireGuard VPN Rocky Linux 8 [Step-by-Step]

Step by step instructions to install wireguard VPN on Rocky Linux. Configure network, firewall and test the VPN

git commit amend PROPERLY [Easy Examples]

Use git commit amend command to update any existing commit with new modifications, update the author details, modify commit message

git detached HEAD Explained [Easy Examples]

Git detached head is a state whereby the head points to a commit and not the branch using the git checkout command.

git remote set-url to change remote repo URL [With Examples]

Use git remote set-url to change remote repository URL. git change remote origin, git change remote url, got change origin examples

Install Graylog on Rocky Linux 8 [Step-by-Step]

Step by step instructions to install graylog on rocky Linux 8. Install and configure elasticsearch, mariadb, java and graylog server

git branch management with examples [Beginners]

Overview on git branch. Different methods to create branch in both local and remote repo. Delete branch properly

git change branch name PROPERLY [3 Examples]

Step by step instructions to git change branch name with examples. Understand the workflow and different scenarios to rename branch name

git diff usage explained [Multiple Scenarios]

Git diff command helps to show a comparison between files, branches, tags and commits that make up a commit-tree. It can bring out the distinction between …

git fetch workflow explained [With Easy Examples]

git fetch is used to get objects and references from remote. It is different from pull operation because pull will additionally merge the changes into local …

git undo commit PROPERLY [5 Different Ways]

Git has provided a variety of functions to manage your working repository including git undo commits that are unwanted. They include git checkout, git clean,

How to use git revert properly [4 Different Ways]

To revert or undo in git is facilitated by the git revert function. git revert command provides a unique way of undoing changes to a specific commit while …

git pull command examples [5 Methods]

Git pull is the process of fetching and merging committed changes from a remote project to your local server. It is combination of git fetch and git merge

git push explained with practical examples [Beginners]

git push local changes to remote branch. git push remote tags. git push to delete remote branch. git push --force and --force-with-lease

git pull vs git pull --rebase explained with examples

Git pull downloads the newest changes from the remote repository and applies the changes to your local repository. by the use of git pull --rebase. The changes …

Defensive Programming Techniques Explained with Examples

Defensive programming can be tough to write source code, but it results in high- quality foolproof code

git merge explained with simple examples [Beginners]

Git merge is simply the act of combining branches. Git usually seeks the unifying base among the two branches for successful merging to be effected.

Install MariaDB on Rocky Linux 8.4 [Step-by-Step]

In this tutorial, we will learn how to install MariaDB on Rocky Linux 8.4. You may also check the mariadb page link for the official instructions to install

Git checkout remote branch PROPERLY [5 methods]

We use git checkout remote branch to access the content of a different branch from the main repository.

Git rename branch - local and remote (PROPERLY)

The three steps to rename branch in git. Step 1; git branch -m old_branchname new_branchname, Step 2: git push origin :old_branchname new_branchname, Step 3: …

git stash explained in detail with examples

What is git stashing and how it works. When should you use git stash command, Different ways to store your changes with stashing, Different ways to restore your …

Git rebase explained in detail with examples

git rebase is used to integrate changes from one branch into another. rebase takes a series of commits (normally a branch) and replays them on top of another …

Git clone repository

In the previous article we created our first git repository. Now let us perform git clone repository to have a local copy of the remote repo in a different

Git create repository

git create repository is performed by initializing a directory using git init command which will create .git folder and create your project repo.

First Time Git Setup | Git Config Global

Download ppa repo to install latest stable version of git. There are different configuration files to setup git environment. Use git config global to setup …

How to Get Started with Game Development?

Game development might sound as simple as creating a video game. But have you ever thought about what it looks like

How to stop ICMP ping flood attack (DOS) on Linux

Prevent ping flood attack in Linux using iptables and firewalld for both IPv4 and IPv6. Apply hash limit to ICMP Echo request to control ping flood in Linux and …

Kubernetes sidecar example | Create multi-container Pod

Kubernetes Sidecar container is just an additional container inside the same Pod. All containers inside the same pod will use the same namespace and will …

How to add or remove label from node in Kubernetes

Add a label to node. Remove a label from node. Use kubectl label node to add or remove a label from worker or controller nodes in Kubernetes Cluster

Kubernetes sidecar container examples

In the Kubernetes space, the container providing helper functionality is called a sidecar container. It lives alongside the main application container within …

How to implement password policy in RHEL Linux with examples

Learn to implement password policy with complexity, old password reuse and more using pwquality.conf explained with examples in RHEL/CentOS 7 Linux

How to configure Ansible on controller and managed node

Step by step instructions to configure ansible on RHEL/CentOS 8. Since ansible is agentless we don't need any configuration on managed nodes.

How to use Ansible managed nodes without Python

How to use ansible without installing python3 on managed nodes. Can we use ansible without python? How to use raw module in Ansible?

Working with managed nodes with password (not passphrase)

We can also use password instead of passphrase to connect with controller to managed nodes using --ask-pass. By default ansible will not prompt for any …

Working with Ansible facts | Create custom facts with examples

Ansible facts is a term used for system information of the managed nodes. By default ansible playbook will gather facts from the managed nodes using setup …

Beginners guide to YAML Syntax in Ansible Playbooks

YAML uses indentation (like Python), which builds the relationship of items with one another and In Ansible, nearly every YAML file starts with a list.

How to repeat tasks using ansible loop with examples

Ansible loop is used to iterate over multiple tasks in playbook. It supersedes with_items in Ansible with later version as with_* are deprecated

Working with include and import module in Ansible

We can use Ansible import module to add playbook, tasks from another file into a different playbook. This can help use the same set of tasks across multiple …

Steps to properly remove node from cluster in Kubernetes

Related Searches: drain kubernetes node, kubectl drain command, remove node from cluster kubernetes, kubernetes evict pods from node, kubernetes drain and

Helm hook-weight examples to order Jobs in Kubernetes

You can use the helm.sh/hook-weight annotation to hook resources that need to be created in a specific order. This weight can be any positive or negative …

Show NFS shares | List NFS mount points | List NFS clients Linux

Examples and commands to show NFS shares on NFS server, List NFS mount points on NFS Clients, List NFS clients connected to the NFS server, List NFS shares in …

10 practical examples to export NFS shares in Linux

This tutorial contains a list of nfs exports options in Linux with examples to create NFS share using /etc/exports. You can share with multiple hosts, single or …

#3-ELK Stack: Configure kibana 7.x with SSL/TLS encryption

Kibana Tutorial to setup, install and configure Kibana dashboard with SSL/TLS encryption over HTTPS for elasticsearch cluster with examples in Linux.

#5-ELK Stack: Configure logstash 7.x with data pipeline

Steps to install and configure logstash 7.x and send data from logstash to elasticsearch. Monitor the logs on Kibana dashboard using index pattern

#4-ELK Stack: Configure metricbeat 7.x to monitor elasticsearch cluster

Tutorial to install and configure metricbeat to monitor elasticsearch cluster in ELK Stack on RHEL/CentOS 7/8 Linux with examples over SSL/TLS (HTTPS)

Simple examples to learn Kubernetes DaemonSets

A Kubernetes DaemonSet ensures a copy of a Pod is running across a set of nodes in a Kubernetes cluster.

How to use Kubernetes init containers with examples

A Kubernetes init container is an additional container in a Pod that completes a task before the "regular" container is started. The regular container will only …

Beginners guide on Kubernetes Namespace with examples

Kubernetes namespace implements strict resource separation. Resource limitation through quota can be implemented at a Namespace level also

Detailed tutorial on Kubernetes cron job scheduler

Kubernetes cron job scheduler can be used to control the a Job resource according to the Job template configured in the CronJob object. When the Job resource is …

How to assign Kubernetes resource quota with examples

The Kubernetes resource quota is applied on the namespace using CPU, memory, storage and object count such as number of pods in the namespace

Kubernetes labels, selectors & annotations with examples

Kubernetes provides labels, selectors and annotations to organize the cluster nodes. These are mostly used with replication controllers and replica sets in a …

Kubernetes ReplicaSet & ReplicationController Beginners Guide

Kubernetes ReplicaSet and ReplicationController (deprecated) are used to scale the number of Pods and make sure the minimum number of Pods are always running.

Getting started with Ansible

What is Ansible? Ansible is an open source tool (with enterprise editions available) developed using Python and runs on Windows, Mac, and UNIX-like systems.

5 easy & useful ways to check Linux kernel version

In this tutorial I will share multiple commands and methods you can use to check the Linux kernel version. The recommended method would be uname which works …

Automate SFTP using shell script with password in Linux/Unix

Steps to automate SFTP using shell script with password and expect with examples SFTP command example in Unix shell script with passwordless authorized_keys

5 simple steps to create shared folder Oracle VirtualBox

How to create shared folder using Oracle VirtualBox with Linux Operating System? Can I share a folder from Windows host to Linux OS inside Oracle Virtual Box?

Solved: Device in bay #X power delayed until VC profile is applied

Steps to overcome Device in bay #X power delayed until VC profile is applied issue on HPE Onboard Administrator and Virtual Connect

How to disable ICMP and ICMPv6 redirects in Linux

Steps to block and disable ICMP redirects for IPv4 and IPv6 in Linux using firewalld and accept_redirects. You can disable these if host is not running as a …

Solved: Kickstart clearpart not working in RHEL CentOS 7 8

Fix kickstart clearpart not working error in RHEl/CentOS 7/8 Linux, kickstart fails to delete existing partitions using zerombr and clearpart in Linux

Easy steps to change default kernel version RHEL/CentOS 8

Step by step instructions to change default kernel from one version to another in RHEL/CentOS 8. You can change from newer to older or vice versa kernel version …

Bash For Loop usage guide for absolute beginners

For loop in bash is used to iterate a certain command or task for a definite or infinite range. You can also use this in C programmer style, combine with …

How to restrict IP Address to use postfix smtp relay

How can I restrict my postfix smtp relay server to be used by only certain IP Address, How to block or allow postfix relay access using mynetworks example

How to reject mail for unknown users in postfix (local_recipient_maps)

How to reject mail for unknown users on localhost with Postfix with local_recipient_maps with example

Easy regex to grep exact match with examples

How do I grep for an exact match for string or pattern from a file in Linux or Unix. How to search for exact pattern. How to grep exact match with examples?

How to add user to sudoers with best practices & examples

How to add user to sudoers file? How to give root privileges to a user in linux? how to give superuser permission in linux? sudoers syntax with examples

How to cleanup Failed Actions from pcs status of cluster

Cleanup failed actions messages in pacemaker cluster. Cleanup failed resource actions and failed fencing actions in pcs status output or HA Cluster

Bash if else usage guide for absolute beginners

Beginners tutorial to learn bash if else statement in Linux and Unix. Nested if statement, Bash if multiple condition, if elif else statement with shell script …

How to declare global variables in Python

How can we define global variables in Python. What is the difference between local vs global variables. What are namespaces, scope and functions in Python …

How to disable SELinux (with and without reboot)

What is SELinux and how can i disable SElinux permanently with or without reboot. Change SELinux mode runtime using setenforce. Enable permissive mode for …

Steps to repair filesystem in rescue mode in RHEL/CentOS 7/8 Linux

Steps to repair filesystem in rescue mode in RHEL/CentOS 7/8 Linux. repair xfs filesystem with xfs_repair. repair ext4 filesystem with e2fsck

Ansible playbook tutorial | How to write a playbook with example

Ansible playbook Tutorial. What is YAML. What is Ansible Playbook. Beginners guide to write playbook with example. Sample ansible playbook to install apache

5 easy steps to blacklist kernel module in CentOS RHEL 7 8

Step by step guide to disable and blacklist kernel module using GRUB2 and modprobe.d in Red Hat and CentOS 7 and 8 Linux. Permanently unload kernel module

Install GNOME | How to enable GUI mode | RHEL CentOS 8

Steps to install gnome desktop environment in RHEL CentOS 8 for workstation and server with gui. Enable and start GUI mode, command to switch GUI mode linux

How to disable ICMP timestamp responses in Linux

Iptables rule to disable ICMP timestamp responses in Linux. Block ICMP timestamp request (13) and ICMP timestamp reply (14). Verify using hping3 or nping

What is tar --strip-components & zip --junk-paths with examples in Linux

How to use tar --strip-components and zip --junk-paths with examples to strip absolute path in Linux and Unix. Force unzip / zip not to create a subdirectory

How to set up proxy for yum repository in Linux?

I will share examples to set up proxy for yum repository in Linux. Modify yum.conf or /etc/yum.repos.d to set proxy for yum repositories.

How to install EPEL repo in RHEL 8 Linux

Steps to install EPEL repo in RHEL 8 or CentsOS 8. How to Fix "Failed to synchronize cache for repo 'epel', ignoring this repo" error in EPEL

How to fix 'pvs shows unknown device' in RHEL/CentOS 7/8

Troubleshoot and fix LVM Error pvs couldnt find device with uuid and pvs shows unknown device Recover or Restore lost physical volume redhat linux