Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 76 of 94

Guide to Stream Redirections in Linux

Satish Kumar
Satish Kumar
Updated on 03-Mar-2023 986 Views

As a Linux user, it's essential to understand concept of stream redirections. Stream redirections allow us to manipulate and control input and output streams of Linux commands. It means that we can control where standard input, output, and error streams are going to and coming from. In this article, we'll guide you through basics of stream redirections and show you how to use them with examples. Introduction to Stream Redirections In Linux, there are three types of streams − Standard Input (stdin) − This is input stream that allows us to send data into a command. Standard Output (stdout) ...

Read More

Concatenating Files in Linux

Satish Kumar
Satish Kumar
Updated on 03-Mar-2023 7K+ Views

Linux is an operating system, it become popular for its open-source nature, flexibility, and reliability. Including its many features, Linux also provides powerful tools for managing files and data, including ability to concatenate files. The concatenation is process of joining two or more files together, creating single file that contains contents of all original files. In this article, we will explore different methods of concatenating files in Linux, including examples and subheadings. Concatenating Files Using cat Command The cat command is a powerful tool for managing text files in Linux. It can be used to create new files, view ...

Read More

Setting Permissions with chown and chmod

Satish Kumar
Satish Kumar
Updated on 03-Mar-2023 3K+ Views

When working with files and directories in Linux, it’s important to understand how to set permissions. Permissions define who can access and modify files and directories on a system. In this article, we will go through how to use chown and chmod commands to set permissions on files and directories. Understanding Linux File Permissions In Linux, each file and directory has three types of permissions: read, write, and execute. These permissions can be set for three different categories of users − owner of file or directory, group to which file or directory belongs, and all other users. The read permission ...

Read More

Configure Postfix to Use Gmail SMTP on Ubuntu

Satish Kumar
Satish Kumar
Updated on 03-Mar-2023 15K+ Views

Introduction Postfix is open-source mail transfer agent (MTA) it allows users to send and receive email on Linux system. It is efficient and easy-to-use solution, it can configured to work with various email providers, including Gmail. In this article, we will show you steps to configure Postfix using Gmail SMTP on Ubuntu. This process involve setting up Gmail account to allow any apps to access it, installing and configuring Postfix, testing setup to ensure it works. Before dive into details, let's take why you might want to use Gmail SMTP with Postfix. Why Use Gmail SMTP with Postfix? Using ...

Read More

Cable TV for Data Transfer

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 2K+ Views

Cable television (TV) networks have been used for data transfer in the past. Cable TV networks were initially designed to transmit television signals, but they have also been used to provide internet access and other types of data transfer services. This is typically done using a technology called "cable modem, " which allows data to be sent over the same cable that is used to transmit TV signals. Cable TV companies often provide internet service through cable modems as part of a bundle that includes TV and telephone services. Cable modem internet service is generally faster than DSL and has ...

Read More

Cable TV Networks

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 3K+ Views

Cable television networks are television channels that are delivered to viewers through cable television systems, as opposed to broadcast television, satellite television, or the internet. Some examples of popular cable TV networks in the United States include ESPN, TNT, and HBO. Cable networks can also be divided into categories, such as news networks (CNN, Fox News), sports networks (ESPN, NBC Sports), movie networks (HBO, Showtime), and lifestyle networks (Food Network, HGTV). Cable Network operate by subscription where viewer pays to the operator to get access to the channels. Types of Cable TV Networks There are several different types of cable ...

Read More

Berkeley's Algorithm

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 7K+ Views

Berkeley's Algorithm is a distributed algorithm for computing the correct time in a network of computers. The algorithm is designed to work in a network where clocks may be running at slightly different rates, and some computers may experience intermittent communication failures. The basic idea behind Berkeley's Algorithm is that each computer in the network periodically sends its local time to a designated "master" computer, which then computes the correct time for the network based on the received timestamps. The master computer then sends the correct time back to all the computers in the network, and each computer sets its ...

Read More

Bifid Cipher in Cryptography

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 2K+ Views

The Bifid Cipher is a polygraphic substitution cipher that was invented by the French amateur cryptographer Felix Delastelle at the end of the 19th century. It is considered a polygraphic cipher because it encrypts pairs of letters at a time, rather than single letters like monoalphabetic ciphers such as the Caesar Cipher. The Bifid Cipher is based on a polybius square, which is a 5x5 grid of letters that is used to encrypt the plaintext. The grid is usually filled with a combination of the alphabet and a keyword or phrase. The letters in the keyword or phrase are placed ...

Read More

Binary Synchronous Communication (BISYNC)

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 2K+ Views

Binary Synchronous Communication (BISYNC) is a communication protocol that uses synchronous transmission to transfer data between devices. In BISYNC, data is transmitted in fixed-length blocks, called frames, with a start and stop bit at the beginning and end of each frame. The start and stop bits are used to synchronize the sender and receiver, so that they can accurately read and interpret the data in the frame. BISYNC uses a complex set of control characters to manage the flow of data and to maintain the synchronization between the sender and receiver. For example, the "ENQ" (enquiry) character is used to ...

Read More

Birman Schiper Stephenson Protocol

Satish Kumar
Satish Kumar
Updated on 08-Feb-2023 1K+ Views

The Birman-Schiper-Stephenson (BSS) Protocol is a distributed computing protocol that allows a group of computers to maintain a consistent shared state despite the possibility of failures. It was first described in a paper by Michael Birman, Roger Schiper, and Tom Stephenson in 1985. In the BSS Protocol, each computer in the group is assigned a unique identifier and acts as a "replica" of the shared state. The replicas communicate with each other using a series of message passing operations to maintain consistency of the shared state. The protocol is based on a "token" that is passed between replicas, which serves ...

Read More
Showing 751–760 of 936 articles
« Prev 1 74 75 76 77 78 94 Next »
Advertisements