Satish Kumar

Satish Kumar

936 Articles Published

Articles by Satish Kumar

Page 87 of 94

How to Calculate Optimal Blocksize to Use With dd in Linux

Satish Kumar
Satish Kumar
Updated on 24-Jan-2023 6K+ Views

The optimal block size to use with the dd command in Linux depends on the specific use case and the hardware that you are working with. However, as a general rule of thumb, it is best to use a block size that is a multiple of the disk's physical block size, as this can lead to better performance. To determine the physical block size of a disk, you can use the fdisk command with the -l option. This will list all the partitions on the disk, along with the start and end cylinders, and the block size. For example, to ...

Read More

How to Check Logs Using journalctl in Linux

Satish Kumar
Satish Kumar
Updated on 24-Jan-2023 3K+ Views

Logs are a crucial component of any Linux system, as they provide a record of system activity, including system events, user actions, and system processes. Log checking, or log monitoring, is the process of regularly reviewing log files to identify any unusual or suspicious activity, such as failed login attempts, system crashes, or security breaches. Log checking is important for maintaining the security and stability of a Linux system, as it allows administrators to quickly identify and troubleshoot problems, and detect and respond to potential security threats. Basic journalctl Commands journalctl is a command line utility for viewing and managing ...

Read More

Exclude grep From ps Results on Linux

Satish Kumar
Satish Kumar
Updated on 24-Jan-2023 3K+ Views

The ps command in Linux is used to display information about the running processes on a system. It provides a snapshot of the current processes, including the process ID (PID), the user that owns the process, the percentage of CPU and memory usage, and the command that started the process. By default, ps only shows information about processes that are running in the same terminal session as the ps command. However, using various options and command line arguments, you can customize the output to show information about all processes running on the system, or even remotely. Listing All Processes To ...

Read More

Introduction to Bash Globbing on Linux

Satish Kumar
Satish Kumar
Updated on 24-Jan-2023 2K+ Views

Bash globbing is the process of using wildcard characters to match multiple filenames or paths. Bash provides several special characters that can be used for globbing, such as *, ?, and []. The * character is a wildcard that can match zero or more characters in a filename or path. For example, the command ls * would list all files in the current directory, while the command ls *.txt would list all files with the ".txt" extension in the current directory. The ? character is similar to the * character, but it only matches a single character. For example, the ...

Read More

Find and Convert Files Ending With CRLF on Linux

Satish Kumar
Satish Kumar
Updated on 24-Jan-2023 15K+ Views

You can use the find command in Linux to search for files ending with CRLF, and the dos2unix command to convert those files to use LF line endings. To search for files ending with CRLF, you can use the following command − find /path/to/search -type f -exec grep -Iq . {} \; -and -exec grep -Il $'\r' {} + This command searches for all regular files in the directory "/path/to/search" and its subdirectories, and prints the names of the files that contain CRLF line endings. Once you have identified the files that need to be converted, you can use ...

Read More

The Reflection Attack

Satish Kumar
Satish Kumar
Updated on 10-Jan-2023 3K+ Views

What is Reflection Attack? A reflection attack is a type of cyber attack in which the attacker sends a large number of requests to a server, each with the victim's IP address as the source address. The server responds to these requests, sending a large number of responses back to the victim. This can cause the victim's network connection to become overloaded, disrupting their access to the Internet or other network resources. Reflection attacks are often used in conjunction with amplification attacks, in which the attacker uses a server with a large response capacity (such as a DNS server) to ...

Read More

Types of Authentication Protocols

Satish Kumar
Satish Kumar
Updated on 10-Jan-2023 9K+ Views

Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices are able to access protected resources, and to prevent unauthorized access or tampering. Types of Authentication There are many different types of authentication protocols in use today, each with its own strengths and weaknesses. Here are some common types of authentication − Password-based authentication − This is the most common form of authentication, in which a user provides a username and password to log in to a system or access ...

Read More

Hashed Message Authentication Code (HMAC)

Satish Kumar
Satish Kumar
Updated on 10-Jan-2023 14K+ Views

What is HMAC? HMAC (short for "Keyed-Hash Message Authentication Code") is a cryptographic hash function that uses a secret key as input to the hash function along with the message being hashed. The resulting hash value is unique to the message and the secret key, and can be used to verify the integrity and authenticity of the message. HMAC is widely used as a secure way to authenticate messages in various communication protocols, including HTTP, SSL, SSH, and many others. It is also commonly used to generate secure hashes for storing passwords, generating unique tokens for session management, and for ...

Read More

Internet Security Association and Key Management Protocol (ISAKMP)

Satish Kumar
Satish Kumar
Updated on 10-Jan-2023 8K+ Views

What is ISAKMP? Internet Security Association and Key Management Protocol (ISAKMP) is a framework for establishing security associations (SAs) and performing key exchange in a secure manner. SAS are agreements between two devices that define how they will communicate securely. Key exchange refers to the process of exchanging keys or other cryptographic material that is used to secure communication. ISAKMP is a protocol that defines the structure and format of messages used to establish and maintain SAs. It does not specify the actual cryptographic algorithms or keys that are used. Instead, it provides a framework for negotiating these details and ...

Read More

Birthday attack in Cryptography

Satish Kumar
Satish Kumar
Updated on 10-Jan-2023 10K+ Views

What is a Birthday Attack? A birthday attack is a type of cryptographic attack that relies on the birthday paradox to find a collision in a hash function. A hash function is a mathematical function that takes an input (called a message) and produces a fixed-size output (called a hash value or hash). The output is usually represented as a string of characters. One of the main properties of a hash function is that it is very difficult to generate the same hash value from two different input messages. This property is called collision resistance. The birthday paradox is a ...

Read More
Showing 861–870 of 936 articles
« Prev 1 85 86 87 88 89 94 Next »
Advertisements