How To Manage Network Connection Using ‘nmcli’ Tool?

In this article, I will tell you how we can manage network connections in Linux. So in this article, we will learn to use nmcli tool. It is a NetworkManager Tool.  It can be used to display network device status, create, edit, activate/deactivate, and delete network connections. So it is a very important tool that helps us to save time. Because we can manage the network connections/profiles directly with the nmcli tool without accessing the GUI NetworkManager. The commands are very short and so simple. So if a beginner tries to managing the NetworkManager Connections/profiles then it wouldn’t be difficult to manage any network with nmcli tool. 

Continue reading “How To Manage Network Connection Using ‘nmcli’ Tool?”

How To Set Local YUM/DNF Repository On RHEL 8?

In this article, I will explain how a local repository is set up on RHEL 8. If you want to install a package in RHEL 8, it will throw an error telling you the dependencies and the repo files error. So to resolve this error, we should install YUM / DNF repository locally or use RHEL’s subscription management. Friends, likewise, in other distros of RHEL we had to set repo files manually, as expected here we would have to do the same. So here I will tell you the set up of local YUM / DNF repo using DVD. So let’s start without wasting time – Continue reading “How To Set Local YUM/DNF Repository On RHEL 8?”

Different Types Of Protocols And Port Numbers

In this article, I will discuss various protocols and port numbers and the usage of protocols. Some of the most common protocols are summarized below Continue reading “Different Types Of Protocols And Port Numbers”

RSYNC Command in Linux with Examples

Rsync is a command-line tool in Linux that stands for remote synchronization. It is used to copy files from a source location to a destination location. You can copy files, directories, and the entire file system and keep in sync the files between different directories. It does more than just copying the files. It reduces the amount of data sent over the network by only sending the files which are new or updated. That’s why is it considered a great utility for file copying and backing up. Rsync also supports the copying of files to a remote system over SSH.

Continue reading “RSYNC Command in Linux with Examples”

How To Create Payload Using Termux?

In this article, I will teach you ‘ How can we create a Payload Using Termux’. Friends making a payload is not as hard as we think. It’s a simple process. But we need to install some prerequisites before making a payload. If we will not complete these steps then we cant create payload in Termux. So let’s discuss what are these requirements for making a payload –

Continue reading “How To Create Payload Using Termux?”

How To Install osTicket in Ubuntu. How To Setup Help Desk Support System in Ubuntu For Beginners.

In this article, I will explain to you the installation of the osTicketing System. So Friends as you know osTicket is an Open Source Helpdesk Support System which is used worldwide. We can manage and organize customer inquiries and complaints in one place. It provides us a user-friendly environment so it becomes very easy to manage the osTicket system.

Continue reading “How To Install osTicket in Ubuntu. How To Setup Help Desk Support System in Ubuntu For Beginners.”

India Plans to Ban On Cryptocurrency.

Is Indian Government Planning to Ban On Cryptocurrency? Yes, Indian govt. has planned to ban the cryptocurrency. They have introduced a new law that will not allow any user to invest in crypto trading. Indian govt. took this decision to keep stay with like other Asian countries in the fledgling market. According to some inspection, this bill will be discussed very shortly by the federal member before sending it to the parliament.

Don’t Know What is Cryptocurrency?

Read this –

A cryptocurrency (or cryptocurrency) is a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a ledger existing in a form of computerized database using strong cryptography to secure transaction records, to control the creation of additional coins, and to verify the transfer of coin ownership. It typically does not exist in physical form (like paper money) and is typically not issued by a central authority. ……( Wikipedia)

Related: – What is Bitcoin and Bitcoin Mining? How Does Bitcoin Works?

What is Bitcoin And How Bitcoin works
Crytpocurrency

In 2018, the Indian govt. suddenly banned te cryptocurrencies when there was a string of frauds in the months. During then the following Prime Minister decided to ban the crypto transactions. But since then Cryptocurrency regulates association fought a case against the Indian govt. In 2020 they got success and in may 2020 this ban was terminated but now in October the govt. again trying to ban the Crypto Trading.

If the Indian govt. bans the Crypto trading then it will affect more than 1.7 billion Indian Tradings in digital assets and a rising number of companies setting up a platform for the trade, according to data research.

Instead of a ban, India needs a regulatory framework to protect uninformed retail consumers “to ensure adequate oversight of the government and the RBI over cryptocurrency businesses,” said Sanjay Khan, Partner, Khaitan & Co, a New Delhi-based lawyer who advises firms. “India can actually benefit from such a regulation to attract cryptocurrency investors and businesses.”

 

How To Become A Hacker? 15 Things to Do to Become Good Hacker.

In this article, I will share my personal experiences and skills on how anyone can become an ethical hacker. There are many videos and websites that talk about the advanced thing of ethical hacking. But no one talks about absolute beginners. Beginners have no idea about how they can enter the cyberspace field, so here I will talk about absolute beginners, who do not know the right way to enter cybersecurity and hacking.

Continue reading “How To Become A Hacker? 15 Things to Do to Become Good Hacker.”

What is Apache Web Server? How Does apache web server(HTTP server) work?

In this article, I’ll discuss What is Apache Web Server? How Does the apache web server(HTTP server) work?” So here you will learn the basics web server in a very simple way. When we configure the Apache server we must have some basic knowledge about this server. So let’s discuss the basic features of the Apache server Continue reading “What is Apache Web Server? How Does apache web server(HTTP server) work?”

What is Malware in Computers? Different Types Of Malware.

In this article, I will explain all terms of Computer Viruses like What is Malware? The Types of Malware, and How this malware can infect our system/PC. Let’s discuss these terms –

Continue reading “What is Malware in Computers? Different Types Of Malware.”

How to install telnet on Linux OS? Learn in very simple steps.

In this article I will explain ‘How to install Telnet server in Linux operating system?’ and how does telnet works in Linux. ‘How does a client uses Telnet in the terminal?’ So to learn this please read all steps very carefully. I already posted an article on ‘How to configure telnet on a Cisco router?’ Both topics are different from each other. But one thing is the same here, that is Telnet. So In both topics, we have to understand the work of telnet. Because we can’t do any of these without the knowledge of telnet. Continue reading “How to install telnet on Linux OS? Learn in very simple steps.”

How are the public and private keys Generated? Encryption and Decryption of the file using Asymmetric Cryptography.

In this post, we will ‘How are the public and private keys generated?‘ Here you will learn about asymmetric cryptography. Besides this, you will also learn about the ways of encryption and decryption of a text file in different ways by using public and private keys along with, the usage of private keys with the passphrase and without the passphrase. But first of all, we must basic info about asymmetric cryptography. As you want to become a cyberman so you must have full knowledge of cryptography. Because it is the most important requirement of cybersecurity.  It is also essential for the purpose of security. So we must have proper knowledge about cryptography. Continue reading “How are the public and private keys Generated? Encryption and Decryption of the file using Asymmetric Cryptography.”

How to create LVM or Logical volume Management in Linux?

In this article I will explain, What is disk stripping? Or How can we create Logical volume management or LVM in Linux? But before this, You must know that What is LVM? Friends if knows the answer then before reading next please write in the comment box and if don’t know just continue your study. So, Guys, LVM refers to device mapper which helps in disk management in Linux. It helps in allocating disks,  striping, mirroring, and resizing of volume disks. With the help of LVM, a set of hard disks can be allocated with different sizes of volumes. Basically, it is used to manage logical disk for allocating dynamic volume which can be increased or decrease according to requirements of the user. It is the Modern way of managing Volume management and quite easy comparing to the traditional method of managing storage volumes.

Continue reading “How to create LVM or Logical volume Management in Linux?”

How to create RAID5 with spare device in RHEL/CentOS? What is Spare device in CentOS/RHEL?

In this article, I will explain, ‘How we can create Raid5 with the spare disks?’ So here you will learn, what are the requirements to create RAID5 and you will also know about spare devices. Already I have discussed about Raid and its levels in my previous post. You can read it. Click here.

Continue reading “How to create RAID5 with spare device in RHEL/CentOS? What is Spare device in CentOS/RHEL?”

What is RAID Array?Different Levels of Raid in Linux? How to Configure Different Levels of RAID in Linux?

In this article, I’ll explain “What is Raid or Disk Stripping”  in Linux. As we all know data storage is very important for every business organization. Because Data is the important information of any organization. So it is very important to keep the security of data. So if a disk failure occurs then original data destroys. So it becomes very difficult to regain exact data from the failed disk. So to provide certainty on data losses, we copy data on multiple disks and combines them in a virtual volume which we call RAID.  RAID stands for Redundant Array of Independent Disk. It’s a virtual disk used to combines the multiple storage devices in the logical volume. It is used to improve redundancy and performance. Continue reading “What is RAID Array?Different Levels of Raid in Linux? How to Configure Different Levels of RAID in Linux?”

How to Compress And Decompress Files in Linux. Different Ways of Compressing and Combining Multiple Files in Linux.

In this article, I will explain about compression and decompression of files in Linux. Here we will learn all methods of compressing and decompressing of files in Linux. So first of all, you must have a question in your mind that, Why do we need compress or decompress a file or folder?” if you have any idea about then mention it in the comment section and if not then continue reading. Continue reading “How to Compress And Decompress Files in Linux. Different Ways of Compressing and Combining Multiple Files in Linux.”

How to Configure Local YUM Repository Linux Using ISO File?

In this article, I will explain how we can configure the yum server in Linux. with the help of  ISO file of RHEL. So to configure yum server in Linux we must have an iso file of RHEL. Iso file is required because we have to mount it in the /mnt directory in the Linux. After mounting it we have to extract the SERVER Directory in the root directory. So to understand complete process please follow the instructions given below-

Continue reading “How to Configure Local YUM Repository Linux Using ISO File?”

In this article, I will explain how we can configure the yum server in Linux. with the help of  ISO file of RHEL. So to configure yum server in Linux we must have an iso file of RHEL. Iso file is required because we have to mount it in the /mnt directory in the Linux. After mounting it we have to extract the SERVER Directory in the root directory. So to understand complete process please follow the instructions given below-

Continue reading “How to Configure Local YUM Repository Linux Using ISO File?”

How To Create Swap Memory in Linux?

In this article, I will explain, how we can create swap memory in Linux?’ So to create Swap memory please follow the instructions given below-

Continue reading “How To Create Swap Memory in Linux?”

How To Create Disk Partitions in RHEL. Create A New Partition In Linux

In this article, I will explain how can we create partitions in RHEL. Here You will learn the easiest simplest and way to create partitions in RHEL.

Guys here is easiest and the only way to create partitions . You can create partition by two methods. i.e. during installation and after installation. Here Im creating partition after installation. You have to read carefully this article. Keep your eyes with full concentration on every step given below.

Continue reading “How To Create Disk Partitions in RHEL. Create A New Partition In Linux”