Thanks for being a regular reader of TGS. I’m very thankful to have you as part of The Geek Stuff family. I really appreciate the lovely support you’ve provided for TGS.
If you believe that TGS has helped you grow and expand your knowledge, it is time for you to share your knowledge with all TGS readers.
The most beautiful things in the world cannot be seen or even touched, they must be felt with the heart. ~ Helen Keller
Happy New Year to all TGS readers from Me and My Daughters (Diya and Neha). We wish you and your family a happy and prosperous New Year.
There is no question that smartphone has changed the way how we live. For most part, it has enhanced the quality of our life dramatically.
But, the question we all should ask ourselves is that are we smart in how and when we are using our smartphones?
Let us not mistake information for knowledge. Just because we have all the information right at our fingertips doesn’t mean our knowledge has improvement.
The following 5 points will help you to get your thinking going in the right direction. Take some time to reflect and see whether you are using these devices smartly.
I’m still learning and make some of these mistakes. But, I’ve taken a conscious effort to make sure that my smartphone is not controlling my life.
Port Knocking technique adds an extra layer of security to your server and network, which will make it little harder for intruders to hack the system.
In this article, we’ll explain the following on a very high-level:
- What is a port?
- What are port attacks?
- What is port knocking and how it helps?
In UNIX and Linux distros, command line programs come with their own documentation called manual pages or man pages.
Man pages are generally written by the developer of the corresponding program. Generally the man pages are divided into number of sections.
The following is the list of all available man sections. Every section has a unique number and contains only a specific type of man pages. For example man section number 3 contains only man pages of library calls.
Most of the systems you are working on might be connected to a hub, or switch, or router. Probably you never thought about those networking devices, how they work, and the differences between them.
In this article, we’ll explain the core technical differences between these networking devices.
Whether it is coding, sysadmin, or life in general, I like to keep things simple.
Don’t write a line of code that is not required, don’t install and configure something that is not required, don’t desire or collect things that are not required.
If you like to be free and simple, you need to start removing the clutter from your life.
TGS is 5 years old now.
To celebrate this occasion my daughter Diya thought it is appropriate to throw a birthday party to her special stuffed toy friend.
She has named her friend “Penguine”.
Of all the stuffed toys, Daddy is always proud when the girls play with Penguine.