VMWare Fusion on MAC OS – Access BIOS/UEFI – Press Function Key + F2 Single User Mode – Press Command + S key, soon after you start/restart your vm, this will take you to GRUB Menu to select the OS distribution that you have installed. Then Press e to edit the boot menu – move…
Category: Technology
Linux Permissions – an Visual Overview
Linux permissions are most important task when it comes to application installation and security hardening of your Linux servers. Linux permissions are – READ [4], WRITE [2], EXECUTE [1] These permissions are presented with numbers as 4, 2, 1. Any File or Directory has a OWNER, GROUP AND OTHERS OWNER – Owner is the one…
Cyber Security
Cyber security is referred to as the practice of securing and protecting computer network, applications, systems, networks, programs and assets that are using and processing data. Digital data is becoming more and more vulnerable due to its growth and distribution on various platforms where all platforms are not well protected or just not created with…
Kubernetes – an Overview
Kubernetes is an orchestration tool/platform to manage, update, scale, reconfigure, deploy and automate the containers, which are called as pods. It was released as an opensource version by Google in 2014 from a properietry tool named as BORG. It is scalable and high available that helps to implement production changes swiftly and is available and…
Free and paid Virtual Platforms for Mac – M1/2/3 Chips (ARM Processors)
There are many virtualization options available in the market for Mac User, however most of them are paid or complicated to use. Below are the top 4 options including free one – Parallels desktop is a paid solution but very good with interface, usability, compatibility with M1, 2, 3 series chipset that support ARM architecture….
Linux grep command
grep command line utility is important utility on linux and unix like systems. It is very helpful to search files based on search patterns or text strings. It is very famous tool because of its vast options capabilities. grep <keyword> <filename>grep options –-e used to pass the pattern-r recursive sreach-n line by line search-w search…
Linux Find Command, an important reference
find command is very useful and is used almost every day by Linux and system administrators. Sharing below some most common find examples which are needed and are helpful for the system administrators to work and complete their day to day tasks – find the files starting with some word/character – find files older then…
Cloud Reference Architecture
Cloud reference architecture is referred to as the need of what cloud services provide. It help to have understanding on operational and technical details and the way cloud is deployed and presented to customers. – SaaS [Software as a Service] – PaaS [Platform as a Service] – IaaS [Infrastructure as a Service] – Hybrid Cloud [Combination of…
Data Security and sovereignty
Data security is of utmost priority for any organisation, while network landscape plays an important role to establish the first line defence, it is also important to consider that how the IAM, policies, data privacy measures are enforced. For the welfare of the citizens of any country or region, it is very important that a…
Root Password Reset for Fedora Linux OS
Step1: Boot your server/VM/Machine into Recovery Mode: Step2: Next is to Remount the Filesystem in Read/Write Mode: AWS VPC and more Application Architectire Ady’s Vlog, do check