Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 5 of 94

60 Hz vs 144 Hz Does it matter

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

Introduction When it comes to gaming monitors, one of key specifications that is often discussed is refresh rate. A monitor's refresh rate determines how many times per second screen is updated with new information. two most popular refresh rates are 60 Hz and 144 Hz. While many gamers swear by benefits of a 144 Hz monitor, others argue that difference is negligible. In this article, we will explore differences between 60 Hz and 144 Hz and help you decide which one is right for you. What is Refresh Rate? Before we delve deeper into topic, let's first understand what refresh ...

Read More

6 Best Books to Learn Computer Networking

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 2K+ Views

Introduction Computer networking is a critical aspect of modern technology. In today's connected world, almost every organization relies on networking to share data and resources. Networking involves connection of multiple devices, such as computers, servers, printers, and other hardware devices, to facilitate communication and data transfer. Aspiring network engineers and IT professionals must have a solid understanding of principles and practices of computer networking to build and maintain efficient network infrastructures. In this article, we'll review six best books to learn computer networking. "Computer Networking: A Top-Down Approach" by James F. Kurose and Keith W. Ross "Computer Networking: A Top-Down ...

Read More

5 Layer Architecture of Internet of Things

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 6K+ Views

The Internet of Things (IoT) has emerged as one of most transformative technological innovations of modern era, enabling interconnectivity of devices and machines that we use in our daily lives. IoT has revolutionized way we interact with technology and world around us, paving way for new business models, improved efficiency, and greater convenience. To enable interconnectivity of devices and machines, a robust and scalable architecture is necessary. 5-layer architecture of IoT is a widely accepted framework that provides a structured approach to IoT system design and implementation. In this article, we will explore 5-layer architecture of IoT, its sub-headings, and ...

Read More

4G Mobile Communication Technology

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 1K+ Views

Introduction Mobile communication technology has undergone significant advancements in recent years, and 4G mobile communication technology is one such example. 4G or Fourth-generation mobile communication technology is most recent and advanced version of mobile communication network that provides better speed, capacity, and coverage than its predecessors. It was first introduced in 2010 and quickly gained popularity worldwide due to its high-speed internet connectivity and better user experience. In this article, we will discuss features, benefits, and limitations of 4G mobile communication technology. Features of 4G Mobile Communication Technology The following are key features of 4G mobile communication technology − High-Speed ...

Read More

3D passwords-Advanced Authentication Systems

Satish Kumar
Satish Kumar
Updated on 27-Sep-2023 604 Views

Introduction As world continues to grow more digital, need for secure and robust authentication systems becomes increasingly important. Passwords have been traditional method of authentication, but with rise of hacking and other cyber crimes, new authentication methods are needed. One such method is 3D passwords, an advanced authentication system that combines multiple factors for enhanced security. This article will explore concept of 3D passwords, its advantages and disadvantages, and some examples of their usage. What are 3D Passwords? 3D passwords are a new type of authentication system that adds an extra layer of security to traditional password-based systems. They are ...

Read More

20 Things to Do After Installing Ubuntu 22.04 LTS (Focal Fossa)

Satish Kumar
Satish Kumar
Updated on 14-Sep-2023 51K+ Views

Ubuntu 22.04 LTS (Focal Fossa) is latest long-term support release of Ubuntu, which means that it will be supported for five years with security updates and bug fixes. If you have just installed Ubuntu 22.04 LTS, congratulations! You are now ready to explore world of Ubuntu and take advantage of its many features and tools. In this article, we will discuss 20 things that you can do after installing Ubuntu 22.04 LTS to make most of your new operating system. These include customizing your desktop, installing new software, configuring your system settings, and more. Update Your System The first thing ...

Read More

How to Check Integrity of File and Directory Using AIDE in Linux?

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 1K+ Views

Introduction Integrity of files and directories is an essential aspect of system security and data protection. File integrity refers to the accuracy and completeness of the information stored in a file, while directory integrity concerns the structure, permissions, ownership, and attributes of directories. When files or directories are tampered with or corrupted, they can cause critical errors, data loss, or even compromise system stability. Therefore, checking file and directory integrity is crucial for ensuring system reliability and preventing security breaches. Installing AIDE on Linux Requirements for Installing AIDE Before installing AIDE, it is important to ensure that the system meets ...

Read More

How To Check If File or Directory Exists in Bash?

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 5K+ Views

Introduction As a programmer or system administrator, you may need to check for file or directory existence frequently. Bash, which stands for "Bourne-Again SHell", is a Unix-based command-line interface that provides powerful scripting capabilities. In this article, we will explore how to check if a file or directory exists in Bash. Checking for File Existence In Bash scripting, it is common to check whether a file exists before performing certain operations on it. Fortunately, Bash provides several ways to accomplish this task. Using the "test" Command The "test" command is a built-in Bash command used to check various conditions and ...

Read More

How to Check and Patch Meltdown CPU Vulnerability in Linux?

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 632 Views

Introduction Released in early 2018, news of a previously unknown hardware vulnerability in Intel's CPUs shocked the IT industry. Dubbed as 'Meltdown, ' this exploit can potentially expose sensitive data on your computer such as passwords, encryption keys, and login credentials to hackers. In worst-case scenarios, it could allow attackers to take complete control of your system without leaving any trace of their activity. Understanding the Meltdown Vulnerability The Meltdown vulnerability is a security flaw that affects modern processors, including those found in most Linux-based systems. The vulnerability takes advantage of a fundamental feature of modern CPUs known as speculative ...

Read More

How to Check and Install Updates On CentOS and RHEL?

Satish Kumar
Satish Kumar
Updated on 31-Aug-2023 3K+ Views

Introduction Keeping your system up to date is essential for maintaining the security, stability, and performance of your computer. Cybercriminals are always looking for vulnerabilities in operating systems and software to exploit, putting you at risk of data breaches, identity theft, and other cyber threats. Moreover, software updates usually include bug fixes and enhancements that improve the functionality and compatibility of your applications with other programs. Therefore, it is crucial to regularly check for updates on CentOS/RHEL and apply them promptly. In this guide, you will learn how to use Yum Package Manager and DNF Package Manager - two popular ...

Read More
Showing 41–50 of 936 articles
« Prev 1 3 4 5 6 7 94 Next »
Advertisements