Atop is an ASCII full-screen performance monitor for Linux that is capable of reporting the activity of all processes (even if processes have finished during the interval), daily logging of syste...
https://www.techvicky.com/2021/05/atop-useful-tool-for-investigation-and.html
WORKLOAD AUTOMATION (WLA) and ROBOTIC PROCESS AUTOMATION (RPA) are both tools that help businesses automate processes and tasks. While they accomplish some of the same things, there are some key ...
https://www.techvicky.com/2021/05/workload-automation-wla-vs-robotic.html
https://developers.redhat.com/blog/2018/02/22/container-terminology-practical-introduction/
https://www.techvicky.com/2021/01/a-practical-introduction-to-container.html
SignatureMiner, a semisupervised security framework for Anti-Virus signatures featuring normalization, customization, clustering and knowledge discovery. SignatureMiner is based on MinHash and r...
https://www.techvicky.com/2020/05/signatureminer-anti-virus-signature.html
1. First install the following packages required for compilation of guest addition modules # dnf install tar bzip2 kernel-devel-$(uname -r) kernel-headers perl gcc make elfutils-lib...
https://www.techvicky.com/2020/03/virtualbox-install-guest-additions-on.html
SHARED HOSTING - CHEAP AND BEGINNER FRIENDLY In a shared hosting environment, you share one server with other customers. These plans include the physical server and the software applicatio...
https://www.techvicky.com/2019/11/types-of-web-hosting-shared-vps-and.html
We need this list because sometimes our Vulnerabiliy Scanning software points out that some old ciphers are WEAK. From the man pages of SSH: -Q cipher | cipher-auth | mac | kex | key ...
https://www.techvicky.com/2019/08/openssh-list-supported-ciphers-and.html
WHAT IS SECURITY AS A SERVICE (SECAAS)? Security as a Service (SECaaS) can most easily be described as a cloud delivered model for outsourcing cybersecurity services. Much like Software as a S...
https://www.techvicky.com/2019/05/security-as-service-secaas.html
THE ULTIMATE 3500-WORD GUIDE IN PLAIN ENGLISH TO UNDERSTAND BLOCKCHAIN. Author : Mohit Mamoria SOURCE : https://hackernoon.com/wtf-is-the-blockchain-1da89ba19348
FLUSH PRIVILEGES mysql> FLUSH PRIVILEGES; when we grant some privileges for a user, running the command flush privileges will reloads the grant tables in the mysql database enabling the chan...
SLM/LMS, SIM, SEM, SEC, SIEM Following is an extract from the ALIENVAULT whitepaper “SIEM-for-Beginners” Although the industry has settled on the term ‘SIEM’ as the catch-all te...
https://www.techvicky.com/2018/11/siem-rose-by-any-other-name.html
Cloud access security brokers (CASB) are on-premises or cloud-hosted software that sit between cloud service consumers and cloud service providers to enforce security, compliance, and governance...
https://www.techvicky.com/2018/11/what-is-casb-cloud-access-security.html
HTTP/2 is a major revision of the HTTP protocol. This new version has several features that make page loading and rendering faster. · MULTIPLEXING allows multiple requests an...
https://www.techvicky.com/2018/10/amazon-cloudfront-and-http2.html
GET THE SIZE OF ALL TABLES IN A DATABASE select table_name, round(((data_length + index_length) / (1024*1024)),2) as 'size in megs' from information_schema.tables where table_schema = 'the_name_...
https://www.techvicky.com/2018/09/mysql-get-size-of-table.html
Imagine you have the choice between opening a box and looking inside, or shaking and prodding it from the outside to guess what it may contain. Imagine further, that if you are unable to success...
https://www.techvicky.com/2018/08/vulnerability-scanning-authenticated.html
The way to get profitable startup idea is not to try to think of startup ideas (including SaaS development). IT'S TO LOOK FOR PROBLEMS, PREFERABLY PROBLEMS YOU HAVE YOURSELF. In fact, for ma...
https://www.techvicky.com/2018/08/profitable-saas-ideas.html
I have tested on Centos 7 yum install cowsay.noarch yum install fortune-mod.x86_64 # vim .bash_profile Add the following line fortune | cowsay Let's try it. $ su - Password: Last...
https://www.techvicky.com/2018/08/install-fortune-cowsay-to-give-some.html
I was a bit surprised to learn about this while processing the request of a customer. Here is the reason why "If a CNAME RR is present at a node, no other data should be present; this ensures ...
https://www.techvicky.com/2018/07/you-cant-add-both-cname-and-txt-to-same.html
MAIL-IN-A-BOX lets you become your own mail service provider in a few easy steps. It’s sort of like making your own gmail, but one you control from top to bottom. Technically, Mail-in-a-Box ...
https://www.techvicky.com/2018/07/deploy-your-own-mail-hosting-with-mail.html
SELinux is a security enhancement to Linux which allows users and administrators more control over access control. Access can be constrained on such variables as which users and applications c...
ON THE FLY: sudo swapoff /dev/hda3 sudo mkswap /dev/hda4 sudo swapon /dev/hda4 FOR BOOTIME : after you have run the mkswap, edit the /etc/fstab file and the change the /dev/hda3 line acco...
https://www.techvicky.com/2018/05/linux-how-do-i-change-swap-partition.html
In computer security , a SIDE-CHANNEL ATTACK is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itse...
A public key certificate provides a safe way for an entity to pass on its public key to be used in asymmetric cryptography. The public key certificate avoids the following situation: if Charlie ...
https://www.techvicky.com/2018/04/public-key-certificates.html
RAID 5 The minimum number of disks in a RAID 5 set is THREE (two for data and one for parity). The maximum number of drives in a RAID 5 set is in theory unlimited, although your storage array ...
https://www.techvicky.com/2018/03/raid-5-raid-10-raid-01.html
Following article cited from www.csoonline.com website What is the GDPR? GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactio...
https://www.techvicky.com/2018/03/general-data-protection-regulation-gdpr.html