Windows Install and use the WSL 2 - Windows subsystem for Linux The Windows Subsystem for Linux lets developers run a GNU/Linux environment -- including most command-line tools, utilities, and applications -- directly on Windows, unmodified, without the overhead of a virtual machine.
Linux Exploit SUDO Security Policy Bypass Vulnerability - CVE-2019-14287 Exploit SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
Windows Determine Hardware Type - Windows PowerShell script we will write a script to determine if a computer is a laptop or a desktop from a hardware prospective and display the output on the console. If this requires admin rights, you should detect if it is running as an admin or standard
Linux How to Delete Files Older than 10 days in Linux This is the best practice to remove old unused files from your server. For example, if we are running daily/hourly backup of files or database on the server then there will be much junk created on the server. So clean it regularly. To
Travel Bike Trip to Leh- Ladakh Leh, a high-desert city in the Himalayas. Ride to Leh-ladakh was in mind for almost 5 years. We rented one RE Himalayan from Delhi.
Linux Linux Kernel Utilities This article focuses on the Linux kernel, and how to work with kernel modules. We will use various commands to find out what version of the kernel we are running, and how to unload, load, and find out information on kernel modules.
Linux What is pseudo file system A regular files system is a method of lying out file and folders on a hard disk. A pseudo file system does not exist on a physical hard disk, it actually created by linux kernel when the computer boots up and this file system exist on RAM.
Windows Ping Multiple Hosts with Powershell In this article, i will show you how to ping a network or a range of ip address with Powershell script.
Linux Managing sudo Access We will strengthen sudo security by removing unnecessary default settings and configure sudo to always require a password. Then, we'll permit specific user accounts to use sudo.
Docker Docker Image Security Best Practices In this article, i will write down Docker image best practices. Micro service is so popular now a days and where the services are deployed in docker container using any of these orchestration tools like Docker swarm, Kubernates.
Linux How to Secure /tmp Directory In this article, i will explain how to secure/harden /tmp directory of a linux system. Securing/Hardening /tmp is so important as an attacker can inject the malicious code through the we application exploit and bring down the server.
Linux Ubuntu 18.04 LTS change hostname permanently You need to use the hostnamectl command to see or set the Ubuntu 18.04 LTS system’s host name. The host name or computer name is usually at system startup in /etc/hostname file. Open the terminal application and type the following commands to set or change hostname or computer name on Ubuntu.
Devops Remote Development Using VS Code The remote Development extension pack allows you to open any folder in a container, or a remote server and take the advantage of VSCode full feature set.
Linux Python script to Ping all IP in a subnet This guide is focused on how to use python to ping all ip addresses on a network and showing the result in the command line
Ansible Common Options ansible-playbook Ansible will append these arguments to the command line when trying to execute playbook
Devops Git Commands This tutorial provides an overview of how to set up a repository (repo) under Git version control. This resource will walk you through initializing a Git repository for a new or existing project.