Satish Kumar has Published 1040 Articles

How to Check Logs Using journalctl in Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:24:40

2K+ Views

Logs are a crucial component of any Linux system, as they provide a record of system activity, including system events, user actions, and system processes. Log checking, or log monitoring, is the process of regularly reviewing log files to identify any unusual or suspicious activity, such as failed login attempts, ... Read More

Exclude grep From ps Results on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:23:03

2K+ Views

The ps command in Linux is used to display information about the running processes on a system. It provides a snapshot of the current processes, including the process ID (PID), the user that owns the process, the percentage of CPU and memory usage, and the command that started the process. ... Read More

Introduction to Bash Globbing on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:21:57

1K+ Views

Bash globbing is the process of using wildcard characters to match multiple filenames or paths. Bash provides several special characters that can be used for globbing, such as *, ?, and []. The * character is a wildcard that can match zero or more characters in a filename or path. ... Read More

Find and Convert Files Ending With CRLF on Linux

Satish Kumar

Satish Kumar

Updated on 24-Jan-2023 19:20:20

11K+ Views

You can use the find command in Linux to search for files ending with CRLF, and the dos2unix command to convert those files to use LF line endings. To search for files ending with CRLF, you can use the following command − find /path/to/search -type f -exec grep -Iq . ... Read More

The Reflection Attack

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 11:04:24

2K+ Views

What is Reflection Attack? A reflection attack is a type of cyber attack in which the attacker sends a large number of requests to a server, each with the victim's IP address as the source address. The server responds to these requests, sending a large number of responses back to ... Read More

Types of Authentication Protocols

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 11:02:27

5K+ Views

Authentication protocols are methods or procedures used to verify the identity of a user, device, or system. These protocols are designed to ensure that only authorized users or devices are able to access protected resources, and to prevent unauthorized access or tampering. Types of Authentication There are many different types ... Read More

Hashed Message Authentication Code (HMAC)

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:57:46

8K+ Views

What is HMAC? HMAC (short for "Keyed-Hash Message Authentication Code") is a cryptographic hash function that uses a secret key as input to the hash function along with the message being hashed. The resulting hash value is unique to the message and the secret key, and can be used to ... Read More

Internet Security Association and Key Management Protocol (ISAKMP)

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:51:04

5K+ Views

What is ISAKMP? Internet Security Association and Key Management Protocol (ISAKMP) is a framework for establishing security associations (SAs) and performing key exchange in a secure manner. SAS are agreements between two devices that define how they will communicate securely. Key exchange refers to the process of exchanging keys or ... Read More

Birthday attack in Cryptography

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:47:59

8K+ Views

What is a Birthday Attack? A birthday attack is a type of cryptographic attack that relies on the birthday paradox to find a collision in a hash function. A hash function is a mathematical function that takes an input (called a message) and produces a fixed-size output (called a hash ... Read More

Public-Key Signatures

Satish Kumar

Satish Kumar

Updated on 10-Jan-2023 10:46:15

3K+ Views

What is a Public Key Signature? A public key signature is a type of digital signature that uses a pair of keys – a public key and a private key – to authenticate the sender of a message. The private key is kept secret by the sender and is used ... Read More

Advertisements