Category: Computer science

To begin with, it is worth explaining the basic terms that help us comprehend the concept of cryptography. It is also evident that each subject of cryptography should be deeply looked into. The first question, however, is what crypto and cryptography are. Crypto as a prefix is derived from Kryptos in the Greek language which means “secret or hidden” while Cryptography is the practice and study of the techniques built and designed for secure communication in the presence of third parties, aka Bob and Alice.

Interactive File Manager [IFM] is a Bash-Script-based program that allows you to simply and interactively get your file management tasks done in six different ways: copying, creating, removing, listing, moving, and renaming in a Linux environment. Using this program, you don’t need to use different commands and memorize different options. To run IFM, you only need to download the binary file of IFM and then run it by typing IFM with sudo privilege.

As a system, Linux, or network administrator, you may need to use Linux high-level commands and tools to get your tasks done as quickly as possible. This article as a reference can bring happiness to your professional life with the flavor of Linux, so be prepared for some advanced Linux-based commands and tricks. This compilation is composed of many advanced and essential Linux commands and tools for professionals based on both Debian and Fedora to be of your assistance whenever possible.

In the IT world, we all agree on the fact that automation is not a buzzword anymore; but how much we know and we can leverage this to the benefit of our manual tasks is a matter of importance. Therefore, at first, let us assume that we have understood the importance of automation. If so, the next stage would be finding a way to start automating our manual tasks if need be at all. As daunting as it sounds, knowing the fundamentals of your chosen tool for automation and programming helps you to do your job easier and quicker.

Are you an amateur Windows user, a help desk, or a syaadmin using Windows to have your work and projects done? If so, you should regularly use a number of commands and shortcuts to do your daily tasks more quickly. There are plenty of good sources available to refer to through they are not comprehensive enough. With this, by spending ample time to find and compile all essential Windows commands and shortcuts for CMD, PowerShell, and RUN, this file can be of your assistance as a reference.

All the network traffic between local networks and external networks has to be carefully monitored and inspected by means of a packet filtering application or a reliable firewall whether an application or dedicated hardware located at the edge of their networks. In this article, we delve deep into the features and functions alongside all the modules of nftables, a leading packet-filtering framework for the Linux environment. This comprehensive guide to nftables step by step gives you an insight into how to utilize this framework to secure your networks as much as possible.

Are you an amateur Linux operator or a system administrator using Linux to have your projects done? If so, you ought to regularly use a number of Linux commands and tools. Clearly, there are plenty of good sources available to refer to even though some are not comprehensive or straightforward enough. With this, I have spent ample time to find and compile plenty of essential and basic Linux commands for every user to be of our assistance whenever possible as a Linux commands reference and manual.