ANGADSINGH OBBIangadsinghobbi.hashnode.dev·Apr 21, 2024Day 2: Installing Linux and running basic commandsIntroduction What is up champs? Now that you've chosen a flavor of Linux that best suits your needs, it's time to dive into installing it and exploring the world of commands. If you're not sure what I'm referring to, feel free to check out my previou...Discuss·1 like·54 readsLinux
Maxat Akbanovmaxat-akbanov.com·Apr 10, 2024Get started with SysVinit init system in LinuxSysVinit, or System V init, is the traditional initialization system that Linux distributions used to adopt to bootstrap the user space and manage system processes after the Linux kernel has been booted. Named after the Unix System V style of initial...Discuss·34 readsbash-and-linuxsysvinit
Karlygash Yakiyayevakarlygash-yakiyayeva.dev·Apr 3, 2024The awk Command in Linuxawk is a powerful programming language used for text processing and manipulation in Unix/Linux environments. It's particularly well-suited for tasks involving structured text files, especially when those files are data files or CSV files. It gets its...Discuss·34 readsToolsDevops
Karlygash Yakiyayevakarlygash-yakiyayeva.dev·Apr 1, 2024Managing Groups in LinuxLinux group management is an essential part of Linux system administration, allowing us to organize users into groups with pre-set permissions for easier management of file permissions and system resources. Types of Groups There are 2 categories of g...DiscussLinuxDevops
Debasish Lenkadebasishlenka.in·Apr 1, 2024Azure Active Directory in a Nutshell🌟In today's fast-paced digital landscape, managing user logins across a myriad of services can be as challenging as herding cats. Traditional login systems often resemble a tangled web, with users juggling separate credentials for each service, while ...DiscussCloud CrewAzure
Brzozovabelikeneoandtrinity.hashnode.dev·Feb 16, 2024All you need to know about SSL/TLS certificates — PART 2This is the next article in a series about TLS/SSL certificates. In the first one I focused on explaining what types of certificates are used, what are the pros and cons of each one and how to implement certificates on your website with Nginx webserv...Discuss·1 likeSSL
Brzozovabelikeneoandtrinity.hashnode.dev·Feb 16, 2024All you need to know about SSL/TLS certificates — PART 1This is the first part of a series of articles about SSL/TLS certificates. SSL/TLS certificates are certificates that facilitate secure communication over the Internet. We use it to encrypt data between a user’s web browser and our webserver. If a we...DiscussSSL
Pace Robertsbearcat.hashnode.dev·Nov 7, 2023The Role of a CISO: Navigating the Cybersecurity LeadershipIntroduction In today's digital landscape, where cyber threats loom large and data breaches can have catastrophic consequences, the role of a Chief Information Security Officer (CISO) has never been more critical. CISOs are responsible for protecting...Discuss#cybersecurity
dev.familydevfamily.hashnode.dev·Oct 5, 2023Admiral. Roles and access division in the menuHi everyone, just a reminder that we are developing Admiral - an open source solution on React, which allows you to quickly develop beautiful CRUDs in admin panels, but create fully custom interfaces if you want. From developers for developers with l...Discuss·51 readsadmin panel
AQIB HAFEEZaqibhafeez473.hashnode.dev·Sep 28, 2023Day 19 || User and Group Configuration Files in LinuxIntroduction Linux, with its robust security features and multi-user capabilities, relies on various configuration files to manage users and groups effectively. In this article, we will explore essential Linux configuration files such as /etc/passwd,...Discuss·85 readsLinux