Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Satish Kumar
Page 2 of 94
How Linux Uses Sockets?
Introduction Linux is an open-source operating system that has gained immense popularity for its stability and security. It is widely used in various fields such as web servers, embedded systems, and supercomputers. One of the key aspects of Linux is its efficient usage of sockets for interprocess communication. Sockets provide a flexible way to establish communication channels between different processes running on the same or different machines connected over a network. What are Sockets? Sockets are a fundamental concept in Linux networking, allowing communication between processes on different computers over a network. In simple terms, a socket is an endpoint ...
Read More10 Best Android Development Courses in 2023
Are you interested in Android development and want to learn how to create amazing mobile apps? Then, you’ve come to the right place. In this article, we’ll be exploring some of the best Android development courses available in 2023. Android is the most popular mobile operating system, with over 2 billion active users worldwide. Therefore, it's no surprise that the demand for skilled Android developers is on the rise. Learning Android development can lead to a rewarding and lucrative career, as well as giving you the opportunity to create innovative mobile apps that can change the world. So, without further ...
Read More10 Best Google Cloud Platform Courses in 2023
Google Cloud Platform (GCP) is a cloud computing platform that offers a wide range of services to help businesses run their operations in the cloud. With its flexible and scalable infrastructure, GCP has become one of the most popular cloud platforms in recent years. If you're looking to learn how to use GCP to its fullest potential, taking a course is an excellent way to get started. In this article, we'll take a look at some of the best GCP courses available in 2023. Introduction to Google Cloud Platform If you're new to GCP, the Introduction to Google Cloud Platform ...
Read More10 Best Computer Science Courses in 2023
In the constantly evolving world of technology, it's imperative to stay updated with the latest developments in computer science. With numerous online courses available, it's challenging to determine which courses are worth taking. In this article, we'll discuss the best computer science courses to take in 2023. Artificial Intelligence (AI) Artificial Intelligence is one of the most in-demand fields in computer science. It is the science of creating intelligent machines that can perform tasks that usually require human intelligence. AI involves the use of algorithms and techniques such as machine learning, natural language processing, and robotics. The following courses are ...
Read MoreHow to setup sendmail in ubuntu?
When it comes to sending email using Linux system, there are a few options to choose from. However, Sendmail is popular choices, and for good reason. Sendmail is efficient and reliable mail transfer agent (MTA) that handle large volume of emails. In this article, we will show you step-by-step how to set up Sendmail on your Ubuntu system. Before we start installation process, let's talk to understand how Sendmail works. Sendmail works by accepting email messages from local or remote mail clients, then relaying them to destination mail servers. This messages can delivered to other machines on the local network ...
Read MoreC program to implement CHECKSUM
What is CHECKSUM? In computing, a checksum is a small-sized data created from a larger data set using an algorithm, with the intention that any changes made to the larger data set will result in a different checksum. Checksums are commonly used to verify the integrity of data that has been transmitted or stored, as errors or modifications in the data can cause the checksum to change. They can also be used to verify the authenticity of the data, as the checksum is often generated using a secret key known only to the sender and receiver. Why we use CHECKSUM? ...
Read MoreCount lines in a file using Linux bash
Overview We sometimes need to determine how large or small a particular text document is. For example, if we're trying to figure out how long a certain email message is, we might use the number of lines in that message to help us estimate its size. Linux has several different methods for determining the length of a text document. We’ll take a closer peek at some of the most common ways of calculating the number of lines in a specific file. Setup For this quick tutorial, we’ll be using a text file called “programing.txt” which has some of the most ...
Read MoreThe Diffie-Hellman Key Exchange
What is Diffie-Hellman Key Exchange (exponential key exchange)? The Diffie-Hellman key exchange (also known as exponential key exchange) is a method for securely exchanging cryptographic keys over an insecure channel. It is a fundamental building block of many secure communication protocols, including SSL/TLS and SSH. The Diffie-Hellman key exchange works by allowing two parties (Alice and Bob) to agree on a shared secret key over an insecure channel, without any other party being able to intercept the key or learn anything about it. The key exchange involves the following steps − Alice and Bob agree on two large prime ...
Read MoreRun a Script on Startup in Linux
There are several ways to run a script on startup in Linux, depending on your specific distribution and the type of script you are trying to run. Using systemd − On systems that use systemd, you can create a systemd service file for your script and configure it to run on startup. Using cron − You can use the cron daemon to schedule your script to run at startup. You can add a line to the cron table (crontab) to run your script at a specific time on startup. Using init.d − On systems that use the older init.d ...
Read MoreFile transfer protocol server configuration using cisco packet tracer
Introduction A File Transfer Protocol (FTP) server is a network protocol that allows users to transfer files between computers over internet or a local area network (LAN). FTP servers are commonly used in businesses and organizations for file sharing and storage. In this article, we will discuss how to configure an FTP server using Cisco Packet Tracer. Setting up FTP server Before configuring an FTP server, we need to have a server machine and an FTP client machine. In this example, we will be using two virtual machines (VMs) on Cisco Packet Tracer, one acting as FTP server and other ...
Read More