- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 825 Articles for Network
![karthikeya Boyini](https://www.tutorialspoint.com/assets/profiles/13518/profile/60_31598-1537784993.jpg)
96 Views
The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ... Read More
![Sharon Christine](https://www.tutorialspoint.com/assets/profiles/13517/profile/60_82215-1512649681.jpg)
264 Views
Cacti is a Network monitoring device that creates personalized graphs of server efficiency. It is accessed and managed via an online entrance-finish. This article explains on – How to install and set up cacti on Ubuntu.PrerequisitesLAMPSNMP, SNMPD and RRDtoolsTo install LAMP, add the following repository as shown below –$ sudo add-apt-repository 'deb http://archive.ubuntu.com/ubuntu trusty universe'To update the packages, using the following command –$ sudo apt-get updateTo install LAMP, use the following command –$ sudo apt-get install apache2 mysql-server-5.6 php libapache2-mod-phpThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done libapache2-mod-php is already ... Read More
![karthikeya Boyini](https://www.tutorialspoint.com/assets/profiles/13518/profile/60_31598-1537784993.jpg)
904 Views
We are amazed at the revolution of technology which brought us by the awesome concept called- Internet of Things (IOT). With the help of intelligent technology, we are able to transform our ordinary home to smart home and control it just by giving the command from a device without physically operating them. There are smart watches that not only track all our physical activities but also alert us when the stats cross the limits.But, on the technology front, things are moving faster so as our needs to get more comfort with the help of technology. That is why now the ... Read More
![Sharon Christine](https://www.tutorialspoint.com/assets/profiles/13517/profile/60_82215-1512649681.jpg)
128 Views
In this article, we will learn – How to install and configure the Sysdiag tool. Sysdiag is an open-source activity monitoring tool which can be used to capture and analyze application logs which have powerful filtering features with customizable outputs.Sysdig works from getting the information from the kernel which allows capturing system calls and the information which comes to the kernel. It also monitors the servers which are installed on the system.Pre-requisitesTo complete this demo we need the following requirements − film John Wick − Chapter 2 online.Ubuntu 16.04 installed on the machineA non-root user with Sudo permission of the ... Read More
![Sharon Christine](https://www.tutorialspoint.com/assets/profiles/13517/profile/60_82215-1512649681.jpg)
2K+ Views
In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More
![Sharon Christine](https://www.tutorialspoint.com/assets/profiles/13517/profile/60_82215-1512649681.jpg)
214 Views
In this article, we will learn about how to configure SFTP without enabling the shell access on Ubuntu 14.04, SSH File Transfer Protocol (SFTP) which is a secure way to transfer files from various a servers are to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) which is supported by all the FTP clients.Protocol (SFTP) is a secure way to transfer files from various servers to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) that is supported by all the FTP clients.SFTP ... Read More
![karthikeya Boyini](https://www.tutorialspoint.com/assets/profiles/13518/profile/60_31598-1537784993.jpg)
298 Views
Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More
![karthikeya Boyini](https://www.tutorialspoint.com/assets/profiles/13518/profile/60_31598-1537784993.jpg)
633 Views
In this article, we will allow you to configure a password-less login for Linux system with SSH keys to connect to a remote Linux server without entering a password which will also increase the trust between two Linux servers for easy file transfer.SSH is an open source and trusted network protocol that is used to login into remote servers for executing of commands and programs. This is also used to transfer files from one computer to another computer over the network using secure copy (SCP).Creating SSH Keys# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to ... Read More
![karthikeya Boyini](https://www.tutorialspoint.com/assets/profiles/13518/profile/60_31598-1537784993.jpg)
239 Views
As the saying goes – A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them. In IT world too mistakes are commonly done by new comers in the field due to inexperience. The Unix world is no different from the rest, and system admins unknowingly tend to commit some avoidable errors in their early days in the beginning of their career. Here are a few mistakes which are made by new system admins or users while working at UNIX prompt.This article explains the 10 most common Linux mistakes.userdel ... Read More
![Sharon Christine](https://www.tutorialspoint.com/assets/profiles/13517/profile/60_82215-1512649681.jpg)
343 Views
Netdata is an enormously optimized Linux utility that presents real-time (per 2nd) efficiency monitoring for Linux techniques, applications, SNMP devices, etc. And shows full interactive charts that certainly renders all collected values over the web browser to investigate them. This article explains about how to find a real-time performance monitoring tool for Linux Systems.FeaturesIt monitors total and per Core CPU usage, interrupts, softirqs and frequency.It monitors Memory, RAM, Swap and Kernel usage.It monitors Disk I/O (per disk: bandwidth, operations, backlog, utilisation, etc).It monitors Network interfaces including: bandwidth, packets, errors, drops, etc).It monitors Netfilter / iptables Linux firewall connections, events, errors, ... Read More