Ayush Singh has Published 179 Articles

Count of Nodes Accessible from all Other Nodes of Graph

Ayush Singh

Ayush Singh

Updated on 02-Aug-2023 15:43:25

296 Views

The number of nodes that may be reached from any particular node in a graph is called as the count of nodes accessible from all other nodes in the graph. It shows the degree of reachability and connectivity inside the graph. We start at each node and investigate all accessible ... Read More

ServerMania - Discover High Availability Cloud Computing, powered by OpenStack

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:46:08

45 Views

With OpenStack, an open-supply cloud computing platform, ServerMania is a marketplace leader in imparting personal and public cloud computing that is absolutely redundant, pretty available, and cost-effective. With the finest customer support within the commercial enterprise, first-rate uptime, and present-day generation, ServerMania offers committed servers and cloud web website hosting ... Read More

Server Operating Systems: Server OS Types & How to Choose

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:43:20

294 Views

Server operating systems play a pivotal role in the working of computer systems by overseeing and controlling the assets of servers. These OS sorts are outlined particularly for server situations, advertising vigorous execution, adaptability, and security. When choosing a server OS, a few variables must be considered. To begin with, ... Read More

Server Automation Guide

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:41:12

92 Views

Server Automation Direct is a comprehensive asset for streamlining and optimising server administration through mechanisation. This direct focuses on the dynamic utilisation of computerization apparatuses and methods to streamline dreary assignments, improve productivity, and diminish human blunders in server operations. By robotizing different angles such as arrangement administration, programme overhauls, ... Read More

Send a curl DELETE Request {With Example}

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:39:15

1K+ Views

The curl Delete task is an HTTP strategy that permits the evacuation of an indicated asset from a server. It is commonly used to Delete information or substances from a web service or API. The Delete request requires the URL of the asset to be Deleted, and extra headers or ... Read More

Securing SSH, Setting Hostname and Enabling Network Services

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:35:02

47 Views

To secure SSH, begin by altering the default SSH port to a non-standard one, employing a solid secret word or key-based verification, and debilitating root login. Furthermore, execute firewall rules to permit only trusted IP addresses to associate. Another option is to set the hostname to an interesting and identifiable ... Read More

Secure ProFTPD Connections Using TLS/SSL Protocol on RHEL/CentOS 7

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:31:39

149 Views

Secure ProFTPD Associations Utilising the TLS/SSL Convention on RHEL/CentOS 7 includes executing Transport Layer Security (TLS) and Secure Attachment Layer (SSL) encryption for secure information transmission over ProFTPD, a well-known FTP server programme. By designing ProFTPD to utilise TLS or SSL, the communication between the FTP client and server is ... Read More

Secure Files/Directories using ACLs (Access Control Lists) in Linux

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:30:02

127 Views

ACLs (Access Control Lists) in Linux give an adaptable and granular way to secure records and catalogues. With ACLs, authorizations can be set for individuals, clients, and bunches beyond the conventional proprietor, bunch, and others. This permits fine-grained control over access rights. By utilising commands like "setfacl" and "getfacl, " ... Read More

Secure Apache with Let\'s Encrypt Certificate on Rocky Linux

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:27:05

150 Views

To secure Apache with a Let's Encrypt certificate on Rough Linux, directors can guarantee secure communication over HTTPS. By getting and introducing a Let's encrypt certificate, Apache can encrypt information transmission, upgrading security and ensuring delicate data. This preparation includes designing Apache to utilise the certificate, empowering HTTPS for the ... Read More

Scrot: A Command Line Tool to Take Desktop/Server Screenshots Automatically in Linux

Ayush Singh

Ayush Singh

Updated on 01-Aug-2023 17:25:11

170 Views

Scrot is a command-line device in Linux that empowers clients to capture desktop or server screenshots. By executing basic commands, clients can take screenshots of their whole desktop or particular districts with exact control. Scrot offers different alternatives for capturing screenshots, such as setting a delay for some time recently ... Read More

Previous 1 ... 7 8 9 10 11 ... 18 Next
Advertisements