SSH (Secure Shell) is a protocol used for securely accessing one computer from another over an insecure network. It provides strong authentication and encrypted data communications between two computers connecting over an…
Category: DevOps
Other great resources
How does mount works
Mount The mount command in Unix and Unix-like operating systems is used to attach a filesystem (from a disk, partition, or storage device) to the file system hierarchy at a specific point,…
How traceroute works
traceroute is a network diagnostic tool used to track the path that an IP packet takes to reach a destination. It provides information about each point (or “hop”) along the route, including…
HTTP GET/POST/POST
GET, POST, and PUT are HTTP methods used in the context of web requests. Each method indicates a different type of action and is chosen based on the operation being performed. Here…
Signals in Linux
Linux signals are a mechanism used for inter-process communication in Unix and Unix-like operating systems, such as Linux. They are used to notify a process that a specific event has occurred, such…
Flatten List in Golang
1. Basic pattern 2. Flatten list to nth level(n=0,1,…), and starts with start
Data Security Ecosystem and Interview Questions
The term “data security ecosystem” refers to the comprehensive framework and set of practices, technologies, policies, and procedures that are put in place to protect digital data from unauthorized access, breaches, theft,…
Frontend framework 2023
As of 2023, the landscape of frontend technologies is quite diverse and dynamic, with a range of tools and frameworks available for developers. Some of the notable frontend technologies include: These technologies…
SOC2 Requirements for Cloud Native
SOC 2 (Service Organization Control 2) is a framework for managing data security that’s particularly relevant for technology and cloud computing companies. It’s designed to ensure that service providers securely manage data…