Linux

Use and examples of Named Pipes

Tags: Linux

Published on : April 6, 2019 by

Use and examples of Named Pipes

Pipe is a method for Inter Process Communication (IPC) which send output of one process to another process. As you know, pipes are of two types: Unnamed Pipes Named Pipes Unnamed Pipe An example of unnamed pipe is as follows: $ ls | wc -l Here output of first command is given as an input […]

Continue Reading...


Building up a WordPress website with AWS – PART 5

Published on : April 4, 2019 by

Building up a WordPress website with AWS – PART 5

CONFIGURING WORDPRESS CONTENTS TO LOAD FROM AWS CDN You may have now setup a LAMP server and may have installed WordPress by following the previous parts of the documentation. Now we will configure WordPress contents to load from AWS CDN. The steps involved are. Installing W3 Total Cache Plugin. W3 Total Cache plugin will help […]

Continue Reading...


How to check whether UDP connection is open or not?

Tags: Server Managementserver monitoring

Published on : February 12, 2019 by

How to check whether UDP connection is open or not?

UDP is being a connectionless protocol, you can t reliably say that the port is open or not. Below two commands are the only way of checking the same. When you send a packet to the open port, there need not be any acknowledgment saying that the port is open. Theoretically, UDP should give a […]

Continue Reading...


SysAdmin series – Understanding the lsof output

Tags: Server Management

Published on : February 4, 2019 by

SysAdmin series – Understanding the lsof output

lsof command displays the list of open files. It could be the list of files opened by a process or it could be a list of files opened by a user or it could be a list of files opened by an IP or it could be a list of files opened by a port. […]

Continue Reading...


How to secure SSH access to your server using TORʼs hidden service ?

Tags: Server Management

Published on : January 22, 2019 by

How to secure SSH access to your server using TORʼs hidden service ?

TOR in a first glance, is used to browse the darknet or to by-pass the firewall restriction. i.e if your firewall blocks certain website you can use TOR browsers to access them. Its really tough to block access to TOR network when your users are using TOR bridges. I know of a few firewalls which […]

Continue Reading...


Let's Connect

Get new updates

Categories

$0.000 items