The skill which refuses to die - Shell scripting

Well I agree this is another article among thousands of articles on shell scripting available on the internet, but I thought of presenting it in a way which would attract you to write your first shell script right away. This may be a tall claim but let me try.

Logical volume management in GNU/Linux

Logical volume management is a very handy tool to take care of your growing need for disk space as more and more data fills your disk. Traditionally hard disk partitions were created during operating system install to statically allocate space to take care of present and future need of disk space.

Securing client server communications using TLS

Online security is matter of concern for netizens as more and more services are being offered and consumed online which require people to divulge their personal, banking and credit card information to their service providers over the internet.

Writing access rules in OpenLDAP

OpenLDAP is a popular open source lightweight directory access protocol server. It's available on many platforms like BSD, GNU/Linux, Windows and many UNIX flavors. It is used to setup directory services for an organization and/or for authentication purposes. Given it's purpose and the critical information which an OpenLDAP server holds, it becomes important to define correct access rules for it to allow only authorized access to information inside it.

Creating backups from LVM snapshots

Logical volume management (LVM) on Linux provides an easy way to create a point in time snapshot of the logical volume (LV) hosting a filesystem. These snapshots freeze the data at that point of time when the snapshot was created even though actual data may keep getting modified on the real logical volume. This allows you to access the data exactly how it was at the point of time when the snapshot was created making way to create point in time backups of the data.

My experience with Microsoft Surface Pro Series

I have been using Microsoft Surface Pro 3 for about 6 months now as my regular laptop and my tablet. I was in a long quest for an unified device which could serve me both as a tablet and a laptop since previously, I owned a dedicated tablet and a laptop and it was frustrating to switch between the two as I liked one for something and the other for something else.

How to write regular expressions to match text patterns

Regular expressions are a powerful way of searching for expressions or in general patterns in a text file.

Most UNIX based text editors and search tools use regular expressions for search and/or replace actions.

End to end guide for writing a LDAP schema

LDAP has been protocol of choice for organizations who want to access information regarding their assets or people stored in their directory software. LDAP provides single sign-on feature which allows it's users to connect to the server once and then have access to all other services / information on the directory. LDAP have access control in form of ACL where roles and privileges of an user can be defined centrally.

What is Perfect Forward Secrecy?

Not so long ago the web was a small and nice place where people did not play bad and wandered around just to read HTML webpages and obtain information. Information travelled in plain text and encryption of data in transit was seen more as an overhead rather than a necessity.

Persistent Key-Value store with Mysql Memcached plugin

Many developers specially web developers know how much caching can speed up responses from a web server. So inevitably they implement one of the many caching techniques available from reverse proxy caching to application based page caching and database object caching. These are all mostly based on storing a key-value pair through an external application. Memcached is a popular key value storage engine which stores data in memory.

Pages

Zircon - This is a contributing Drupal Theme
Design by WeebPal.