- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Satish Kumar has Published 1040 Articles
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
11K+ Views
Introduction Git is a popular version control system used by developers to track changes in their codebase. Git Stash is a feature that allows developers to temporarily save changes they have made to their working directory, without committing them to the repository. This feature is useful when developers need to ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
670 Views
Introduction Before we dive into the topic of how to get total inodes of root partition, let's start with understanding what inodes actually are. Inodes, short for Index Nodes, is a data structure used by the file system to store information about files and directories. Every file or directory on ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
28K+ Views
Introduction In the Linux operating system, a directory is similar to a folder in other operating systems. It's a way to organize files and other directories, which helps the user easily locate and access them. Directories can be nested within each other, creating a hierarchical structure that can be several ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
1K+ Views
Introduction Secure Shell (SSH) is a widely used protocol for securely connecting to remote systems over unsecured networks. It provides a secure channel for communication between two systems, allowing users to execute commands and manage files on remote machines without the risk of eavesdropping, tampering, or identity theft. However, ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
3K+ Views
Introduction Helm is a well-known Kubernetes package manager and an open-source tool used to streamline the installation, upgrading, and management of Kubernetes applications. With Helm, users can create version-controlled application releases that are easy to reproduce and manage. The tool simplifies deployment by allowing developers to package their applications as ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
15K+ Views
Introduction In this article, we will focus on how to generate SSH keys on Ubuntu - one of the most popular Linux distributions used by developers worldwide. We will provide step-by-step instructions for generating an SSH key pair using both command line interface (CLI) and GUI tools like FileZilla. The ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
461 Views
Introduction SSH, short for Secure Shell, is an encryption protocol that provides a secure connection between two computers over an insecure network, such as the internet. It allows users to remotely and securely access and control another computer or server. SSH works by encrypting all data sent between the two ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
639 Views
Introduction In today's digital age, cybersecurity is a top priority for businesses and organizations. Data breaches and cyber attacks can result in significant financial losses and damage to reputation. Kubernetes is a popular container orchestration system used by many organizations to manage their containerized applications. However, with the increase ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
198 Views
Introduction In today's digital age, website security has become an extremely important aspect for businesses to consider. Cybercrime is on the rise and attackers are constantly finding new ways to exploit vulnerabilities in online systems. One of the main ways to protect websites from cyber threats is by implementing SSL/TLS ... Read More
![Satish Kumar](https://www.tutorialspoint.com/assets/profiles/562858/profile/60_1148539-1669800354.jpeg)
Satish Kumar
422 Views
Introduction A Certificate Signing Request (CSR) is a document that contains information about the entity requesting an SSL/TLS certificate. The CSR includes the public key and relevant identifying information about the entity, such as its name and location. This information is used by a certificate authority (CA) to verify that ... Read More