There is no question that smartphone has changed the way how we live. For most part, it has enhanced the quality of our life dramatically.
But, the question we all should ask ourselves is that are we smart in how and when we are using our smartphones?
Let us not mistake information for knowledge. Just because we have all the information right at our fingertips doesn’t mean our knowledge has improvement.
The following 5 points will help you to get your thinking going in the right direction. Take some time to reflect and see whether you are using these devices smartly.
I’m still learning and make some of these mistakes. But, I’ve taken a conscious effort to make sure that my smartphone is not controlling my life.
Port Knocking technique adds an extra layer of security to your server and network, which will make it little harder for intruders to hack the system.
In this article, we’ll explain the following on a very high-level:
- What is a port?
- What are port attacks?
- What is port knocking and how it helps?
In UNIX and Linux distros, command line programs come with their own documentation called manual pages or man pages.
Man pages are generally written by the developer of the corresponding program. Generally the man pages are divided into number of sections.
The following is the list of all available man sections. Every section has a unique number and contains only a specific type of man pages. For example man section number 3 contains only man pages of library calls.
Most of the systems you are working on might be connected to a hub, or switch, or router. Probably you never thought about those networking devices, how they work, and the differences between them.
In this article, we’ll explain the core technical differences between these networking devices.
Whether it is coding, sysadmin, or life in general, I like to keep things simple.
Don’t write a line of code that is not required, don’t install and configure something that is not required, don’t desire or collect things that are not required.
If you like to be free and simple, you need to start removing the clutter from your life.
TGS is 5 years old now.
To celebrate this occasion my daughter Diya thought it is appropriate to throw a birthday party to her special stuffed toy friend.
She has named her friend “Penguine”.
Of all the stuffed toys, Daddy is always proud when the girls play with Penguine.
From an email client, you’ll typically compose a message, attach any necessary files, and send it to the recipient. But, have you wondered what happens behind the scenes? How the email is sent from your outbox to the recipients inbox?
In this article, we will explain the basis of email. For those who already know this stuff, this might be a quick refresher.
IP multi-casting is a communication mechanism in which data is communicated from server to a set of clients who are interested in receiving that data. Any client can dynamically enter or leave the communication.
Though the overall concept seems very simple but the way it is implemented requires good understanding. So, in this tutorial we will cover the basics of IP multi-casting and how it is achieved.