- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 2065 Articles for Operating System
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
283 Views
SSH (Secure Shell) is a popular protocol for securely connecting to remote servers over a network. When you use SSH to connect to a server, you typically need to provide a username and password to authenticate your identity. However, this process can be tedious if you need to connect to multiple servers frequently. Fortunately, there is a solution: No Password SSH Keys Authentication. In this article, we'll walk you through the process of setting up No Password SSH Keys Authentication on a Linux server using PuTTY, a popular SSH client for Windows. With this setup, you can connect to your ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
790 Views
Managing multiple Linux servers can be a challenging task, especially for those who are new to the Linux environment. Luckily, there are several tools available that make this task easier, and one such tool is Cockpit. In this article, we will explore what is Cockpit, its features, how to install and configure it, and how to use it to manage your Linux servers. What is Cockpit? Cockpit is a powerful web-based graphical interface for managing and monitoring multiple Linux servers. It provides an easy-to-use and intuitive interface that allows system administrators to manage servers from a single location. With Cockpit, ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
142 Views
Data loss is one of the biggest threats to businesses and individuals alike. Whether it’s due to hardware failure, accidental deletion, or cyber-attacks, losing important data can have serious consequences. That's why having a reliable backup solution is crucial for safeguarding your important data. In this article, we will provide a comprehensive review of CloudBerry Backup for Linux, including its features, benefits, and installation process. We will also provide working code examples and step-by-step instructions to help you get started with the software. By the end of this article, you'll have all the information you need to decide whether CloudBerry ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
142 Views
If you're looking for a reliable way to back up your data to the cloud, then Veeam Cloud Connect is the solution for you. With Cloud Connect, you can easily send your data to a cloud-based backup repository managed by a Veeam service provider. In this article, we'll provide a comprehensive guide on how to use Cloud Connect, including installation, configuration, and backup. What is Cloud Connect? Veeam Cloud Connect is a cloud-based backup and disaster recovery solution designed to provide users with a secure, reliable, and efficient way to protect their data in the cloud. It allows businesses to ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
301 Views
Linux is a powerful and flexible operating system used by developers, system administrators, and enthusiasts alike. However, learning Linux can be challenging, especially for beginners. There are many commands and tools to remember, and it can be overwhelming to keep track of them all. That's where Cheat comes in. Cheat is an open-source command-line utility that provides quick access to command-line cheatsheets. In this article, we will introduce you to Cheat and show you how to use it. What is Cheat? Cheat is a command-line utility that provides access to command-line cheatsheets for various Linux commands and tools. It is ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
151 Views
Centralized secure storage is an essential component of many modern IT infrastructures. It allows multiple servers to access a shared storage pool, enabling a higher degree of flexibility, scalability, and availability. One popular method of centralized secure storage is iSCSI (Internet Small Computer System Interface). In this article, we will guide you through the process of setting up an iSCSI initiator client on CentOS. What is iSCSI? iSCSI is a protocol that allows a server to access storage devices over a network. It encapsulates SCSI commands and data into IP packets, allowing the server to communicate with the storage device ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
534 Views
As a Linux user, you may often find yourself needing to transfer files between different hosts on your network. While there are several ways to do this, the Distributed Copy (DCP) protocol is a peer-to-peer method that offers a convenient and efficient solution. In this blog post, we will explore DCP in more detail, including how to install and use it to transfer files between Linux hosts. We will also discuss some of the security considerations when using DCP, and how to use SSH to ensure secure file transfers. What is DCP? DCP is a protocol that enables peer-to-peer file ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
557 Views
Databases are at the core of many modern applications, and they allow developers to store and manipulate large amounts of data efficiently. One of the fundamental concepts in database design is the relationship between tables. In this article, we will explore the different types of database relationships and how they are established. Introduction to Database Relationships A database relationship is a link between two tables that defines how the data in the tables is related to each other. Relationships between tables are established using keys, which are unique identifiers that allow data to be connected across tables. There are three ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
379 Views
In today's fast-paced digital world, having a clear understanding of your network traffic is essential. Whether you are a network administrator or a casual user, monitoring your network traffic can help you identify and troubleshoot potential issues, as well as optimize your network for better performance. One tool that can help you achieve this is Darkstat – a web-based Linux network traffic analyzer. In this blog post, we'll take a closer look at what Darkstat is, how it works, and how you can use it to monitor your network traffic. What is Darkstat? Darkstat is a network traffic analyzer that ... Read More
![Mrudgandha Kulkarni](https://www.tutorialspoint.com/assets/profiles/671038/profile/60_465235-1687330012.png)
554 Views
If you are managing multiple Docker containers, it can be challenging to keep track of their resource utilization, network connectivity, and overall health. Fortunately, there's a tool called ctop that can help. ctop is a top-like interface for monitoring Docker containers in real-time. It provides an intuitive visual representation of container metrics, including CPU, memory, network, and disk usage. In this blog post, we'll take a closer look at ctop, its features, and how to use it effectively. What is ctop? ctop is a command-line tool that provides a top-like interface for monitoring Docker containers. It provides an overview ... Read More