SSH (Secure Shell) is a protocol used for securely accessing one computer from another over an insecure network. It provides strong authentication and encrypted data communications between two computers connecting over an…
How does mount works
Mount The mount command in Unix and Unix-like operating systems is used to attach a filesystem (from a disk, partition, or storage device) to the file system hierarchy at a specific point,…
How traceroute works
traceroute is a network diagnostic tool used to track the path that an IP packet takes to reach a destination. It provides information about each point (or “hop”) along the route, including…
HTTP GET/POST/POST
GET, POST, and PUT are HTTP methods used in the context of web requests. Each method indicates a different type of action and is chosen based on the operation being performed. Here…
Hard link and Soft link
In Unix-like operating systems, hard links and soft links (also known as symbolic links) are two types of links that can be created to reference files. They serve different purposes and have…
Zombie Process
In Linux and other Unix-like operating systems, a “zombie” process, or defunct process, is a process that has completed execution but still has an entry in the process table. This occurs when…
Signals in Linux
Linux signals are a mechanism used for inter-process communication in Unix and Unix-like operating systems, such as Linux. They are used to notify a process that a specific event has occurred, such…
Some common HTTP headers
HTTP headers are an integral part of HTTP requests and responses, providing essential context about the data being transferred. Here are some common HTTP headers along with explanations for each: 1. Connection:…
Flatten List in Golang
1. Basic pattern 2. Flatten list to nth level(n=0,1,…), and starts with start
Data Security Ecosystem and Interview Questions
The term “data security ecosystem” refers to the comprehensive framework and set of practices, technologies, policies, and procedures that are put in place to protect digital data from unauthorized access, breaches, theft,…