Posts

Showing posts from January, 2022

LockBit 2.0

Image
  What is LockBit 2.0 ? LockBit is the latest ransomware gang whose Linux encryptor has been discovered to be focusing on the encryption of VMware ESXi virtual machines. What Lockbit 2.0 provides ?  LockBits provides a command-line interface allowing affiliates to enable and disable various features to tailor their attacks. the encryptor uses AES to encrypt files and elliptic-curve cryptography (ECC) algorithms to encrypt the decryption keys. For Python and Shell Scripting Tutorials :  https://payhip.com/b/247HD

Devops Real Time Problem

Image
  1. Suppose you are going for the interview and interviewer ask you to write a shell script to add the  users. At this point of time below example will help you. Ans: adduser is a linux command which is used to add the user in the linux server. Script: #!/bin/bash echo " Step 1:We will take the users from the file" echo " Step 2:Create a txt file and add all the user name which you want to create" echo " Step 3:Add user one by one using for loop" for i in $(cat users.txt); do echo "Adding user" echo $i sudo adduser $i done Output: $ ./1.sh Step 1:We will take the users from the file Step 2:Create a txt file and add all the user name which you want to create Step 3:Add user one by one using for loop Adding user a Adding user b Adding user c For Python and Shell Scripting Tutorial :  https://payhip.com/b/247HD Free Demo Videos : https://www.youtube.com/channel/UCt2T23g4bLe0_NcuXqFdpkQ

Gitlab

Image
  WHAT IS GITLAB ? Gitlab is an application where programmer can write the code and test the code simultaneously.It provides two factor types of authentication.With the help of gitlab we can integrate external application as per our requirements like Jira, campfire , LDAP etc. We can also automate the task in gitlab using API. We can use gitlab as a authentication service provider to login to other applications.Using webhooks programmer gets alert when someone in their team push the code. In Gitlab we can also use the docker to store the different project in different container as per our convenience or user convenience.In gitlab We can also convert the svn repository to git or gitlab. In Gitlab API , we can use different types of authentication token like private token , personal access tokens , Oauth 2 tokens and session cookies.Gitlab API also design in such a way to return different status codes as per the context and action. REQUIREMENT: 1. OPERATING SYSTEM : UBUNTU 14.04 2. R...

Linux Real Time problem-1

Image
  Suppose you are working  in a company and there are multiple access points.You want to make sure all the access point  is up  and fine.How will you do this using scripting ? Flow-diagram Step 1: First create a simple script file  Step 2: Store all the access point IP address in the file. Step 3: Alert the admin if anyone of the access point goes down using email Step 4: Put the script in the Cron job so that it will check after every one minute. Please try  to prepare the script  and let me know if any assistance needed. For Python and Shell Scripting Tutorial : https://payhip.com/b/247HD

Top five open source text editor

Image
  1. Vim For more information :  https://www.vim.org/ 2. emacs For more information :  https://www.gnu.org/software/emacs/ 3. Interactive editors For more information :  https://opendylan.org/documentation/getting-started-ide/editopt.html 4. gedit For more information :  https://wiki.gnome.org/Apps/Gedit 5.Etherpad For more information :  https://etherpad.org/ For python and shell scripting tutorials : https://payhip.com/b/247HD

Top five open source firewall

Image
  1. Pfsense Url:  https://www.pfsense.org/ 2.  Untangle Firewall Url:  https://www.untangle.com/untangle-ng-firewall/ 3. OPNsense Firewall Url:  https://opnsense.org/ 4.  IPCop Firewall Url:  https://www.ipcop.org/ 5. IPFire Url:  https://www.ipfire.org/ E-book:   https://payhip.com/linuxkuriosity

Spring Boot

Image
  1. What is Spring boot ? Ans: Spring Boot is an open source Java-based framework used to create a Micro Service. It is developed by Pivotal Team. It is easy to create a stand-alone and production ready spring applications using Spring Boot. 2. What is Micro service ? Ans: Micro Service is an architecture that allows the developers to develop and deploy services independently. Each service running has its own process and this achieves the lightweight model to support business applications. 3. What are the two advantages provided by microservices to its developers ? Ans: Micro services offers the following advantages to its developers − Easy deployment Simple scalability Spring Boot provides a good platform for Java developers to develop a stand-alone and production-grade spring application that you can just run. 4. What are the two basic goals of the spring boot ? Ans:Spring Boot is designed with the following goals − To avoid co...

RHEL 7

Image
  1. Shutting Down, Suspending and Hibernating the System Objective: Below problems help you to use the shutdown command in the different scenario. Benefits: 1. Able to the shutdown the system. 2. Able to halt or reboot the system as per your need. 1. In Rhel 7, suppose you have to power off the system. How will you do? Ans: Command: systemctl poweroff 2. In Rhel 7, suppose you have to halt the system.How will you do? Ans: Command: systemctl halt 3. In Rhel 7, suppose if you have to reboot the system. How will you do? Ans: Command: systemctl reboot 4. In Rhel 7, Suppose if you want to power off the host at a specific time. How will you do ? Ans: Command: shutdown --poweroff hh:mm 5. In Rhel 7 , Suppose if you want to cancel the scheduled shutdown of the machine. How will you do? Ans: Command: shutdown -c 6. In Rhel 7, Suppose if you want to suspend the host How will you do for the single host or multiple hosts?After suspending it where system state is stored? Ans: Command: systemct...

RHEL 8

Image
  1. Cockpit a. It is an interactive server administration interface. Cockpit directly contact with the operating system from a real linux session in a browser. b. Basic operation of cockipit are as follows: 1. shutting down or restarting the system. 2. inspecting hardware information 3. setting hostname and many more. Practical Problem: Suppose you are working in a company and your manager ask you to restart the system from the cockpit. At this point of time cockpit will help you. 2. Date a. date is a command which is used to display the current date and time. Command: date Practical Problem: Suppose you are working in a company and your manager ask you to display the current date and time of any specific system. At this point of time above command will help you. 3. nmcli a. It is used to manage network connections. b. Below command is used to display all connections. Command: nmcli con show Practical Problem: Suppose you are working in a company and your manager ask you to displa...

Operating System

Image
  1. Introduction a. An operating system is an interface between a computer user and computer hardware. b. It controls the execution of all kinds of program. Benefits: After going through the above facts, You would be able to answer the below question: 1. What is the use of Operating System? 2. Memory Management a. An operating system keeps tracks of primary memory. b. The Operating system decides which process will get memory allocation or deallocation. Benefits: After going through the above facts, You would be able to answer the below question: 1. Who will decide the memory allocation ? 3. Processor Management a. An operating system keeps tracks of processor and status of process. b. allocates or de-allocates the processor to a process. Benefits: After going through the above facts, You would be able to answer the below question: 1. Who will keep the tracks of the processor ? 4. Device Management a. An operating system manages device communication with the help of respective dri...

Embedded Systems

Image
  1. What is system ? Ans: A system is an arrangement in which all its unit assemble work together according to a set of rules. It can also be defined as a way of working, organizing or doing one or many tasks according to a fixed plan. 2. What are the three components of the embedded system ? Ans: An embedded system has three components − It has hardware. It has application software. It has Real Time Operating system (RTOS) that supervises the application software and provide mechanism to let the processor run a process as per scheduling by following a plan to control the latencies. 3. What are the characteristics of an embedded System ? Ans: Characteristics of an Embedded System Single-functioned  − An embedded system usually performs a specialized operation and does the same repeatedly. For example: A pager always functions as a pager. Tightly constrained  − All computing systems have constraints on de...

Database

Image
  1. Mysql is developed.marketed and supported by ______________ a. Mysql AB b. Mysql BC c. Mysql DC d. none Ans: a It is a swedish company. 2. A ____________ is a separate application that stores a collection of data. a. database b. metabase c. deltabase d.none Ans: a 3.A ________________ is a software that enables you to implement a database with tables, columns and indexes. a. RDBMS ( Relational database management system) b. DBMS c. CDMS d.none Ans: a 4. A _____________ is a matrix with data. a. table b. cable c. network d.none Ans: a 5. A ___________ is a group of related data. a. row b. function c. data d.none Ans: a For more QA please click on below link: https://payhip.com/b/6Grs7

Networking

Image
  1. A _____________ is a system in which multiple computers are connected to each other to share information and resources. a. computer network b. data c. operating d.none Ans: a Share resource from one computer to another. 2. What are the _______ basic hardware required to setup a computer network? a. three b. four c. two d.one Ans: b 1. Network cables 2. Routers 3. Internal network cards 4. External network cards 3. __________ network cables are used to connect computers. a. RJ-45 b. RJ c. RJ-98 d. none Ans: a 4. Networking allows us to share ___________ main things a. three b. four c. two d.none Ans: a 1. data 2. resource 3. application 5. Networking allows us to exchange _______ between computers. a. data b. memory c. delta d.none Ans: a For more QA please click on below link  https://payhip.com/b/qpcA1

Uses of cp command with real time scenario

Image
                                              1. cp a. It is a command which is used to copy the files or directories from one place to another place. Example: ~$ cp Topics.odt /home/anil/Downloads/ ~$ Real Time Problem: Suppose you are working in a company and your manager ask you to copy the file in one more location. At this point of time above example help you. b. We can preserve the permission of the files or directories while copying from source to destination. Example: ~$ cp -dR --preserve=all Text.txt /home/anil/Downloads Real Time Problem: Suppose you are working in a company and your manager ask you to copy the file in to another location by preserving the ownership and permission of the file. At this point of time above example help you. If you are looking for more example please click on below link: https:...