Hello readers! Ever thought about the risk of loosing your USB drive having important data? You surely don’t want others to get that data without your permission. Right? In this case, encrypting your USB device is a recommended way to keep a security layer. Keep reading for a simple tutorial to encrypt USB drives with LUKS.
Hello all! Today, we had an ansible session in #dgplug by trishnaguha. Before the session, I just had an idea about ansible, that it is used in sort of YAML deployment or something. But never really tried it before. It was a nice experience using ansible. Let me give you a quick wrap up of the session.
Hey! I was curious about if we can create a bootable USB drive from Command Line Interface alone. I always have my utmost trust in CLI but this task sought to be tricky. Therefore, I set myself relaxed and dived to search a solution on duckduckgo.
Hi! I have been learning django these days. I came across some basic commands that every beginner should know about. Continue reading “DJango startup commands”
Hey! With this post, I am sharing my experience with Linux command line interface.
Before I learned about what is Linux and what is CLI, I couldn’t imagine myself working on a computer without any mouse and GUI. But, when I started learning Linux about a year ago, then CLI was something that sought my attention and I started to learn it. Continue reading “My experience with Linux CLI”
Hey all! I have been attending dgplug summer training this year. And it’s been a wonderful experience going on. I have attended all the sessions so far and could imagine the magnitude of knowledge I would be learning as the training continues. Let me tell you how this summer training is turning out to be a new learning curve for me. Continue reading “A new learning curve @dgplug”
A very well welcome to my lovely reader! how are you, by the way?
Well, A long way back I heard about something called “Telnet”. At that time I got to know that it is used for remote login. That’s it! The book didn’t describe how did “Telnet” work the way it is explained. And nor ever I got the fair idea of what actually this Telnet is. Recently when I searched for the fact that was not discussed in that book. And I got to know that this “Telnet” is no more usable.
What is remote login? what is Telnet? why don’t we use it now? and If we don’t use it then what do we use now instead? and how do we use that novelty? Let’s see guys you gonna dive into something called SSH.