The purpose of this guide is to list all disk partitions, and their sizes on a Linux operating system. This will help you identify what hardware storage you have available,…
This article unfolds some questions in a logical order, starting with background on the OSI and DoD models, focusing on the Data Link and Physical layers. Further it proceeds up…
Git is a popular, free Version Control System, designed for use by software developers. The essence of Version Control is the ability to capture the state of software documents, and…
In Ubuntu, services refer to background processes that run on a system, even when no user is logged in. Some examples of commonly used services in Ubuntu include: Apache Web…
Monero (XMR) is a privacy-focused cryptocurrency that requires a wallet to store, send and receive XMR. Here are a few popular options for Monero wallets: Monero GUI: official desktop wallet…
Creating an alias for use on the command line can save the user from typing long commands, common options, or typos. This will save you some time and repetitive keystrokes,…
The .htaccess file is a configuration file used by the Apache web server to override default server settings for a specific directory or subdirectory. It allows webmasters to customize the…
Ubuntu uses UFW (Uncomplicated Firewall) as its default firewall management tool. It is a user-friendly front-end for iptables and makes it easier to configure the firewall by providing a set…
Chromium is an open-source web browser project developed by Google. It is the basis for the Google Chrome web browser, but there are some differences between the two. One main…
The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower Threat Defense system. This course gives you knowledge and…
AWS is designed to allow application providers, ISVs, and vendors to quickly and securely host your applications – whether an existing application or a new SaaS-based application. You can use…
The following are some of the main vulnerabilities that websites and web applications have: Directory Traversal Attack A directory can be described as a folder that a web designer uses…
R is a programming language designed for statistical computing and graphics. It is free, open-source, and available on Linux, Mac OS X, and Windows operating systems. R is an essential…
Unfortunately, big-data analysis cannot be accomplished using traditional processing methods. Some examples of big data sources are social media interactions, collection of geographical coordinates for Global Positioning Systems, sensor readings,…