Public Key Cryptography Basics

Encryption is the process of taking a message and scrambling its contents so that only certain people can look at your message. Symmetric Encryption Let’s take the example of Alice and Bob. Alice has a sensitive document that she wants to share with Bob. She uses an encryption program to […]

Read More

Docker 103: Volumes

In the first part, we took a look at basics of Docker, building, stopping and removing them. This part will consist of mainly playing with changes and handling the concepts of volumes in docker. If we have to change few lines of code or “Hello World” to “Hello Div”, we […]

Read More
docker namespaces

Docker 102: Internal Working

Docker internal working: One of the goals of modern software development is to keep applications on the same host or cluster isolated from one another so they don’t unduly interfere with each other’s operation or maintenance. One solution to this problem has been virtual machines, which keep applications on the same hardware […]

Read More
docker concepts

Docker concepts: file, images, and containers

I’ve been asked these questions quite a few times and I am confused about how to explain it in layman’s term, but again if you can’t explain it to a 5 yr old, you don’t understand it yourself. Dockerfile: A Dockerfile is a text document that contains all the commands a user […]

Read More

Docker 101: Basics

Docker is cool. I’ve just started to use and play it for small projects. This part will cover the basics of building and running docker containers and images. I started taking courses on which is given out free by my university and I went on a Binge Spree to […]

Read More

Linux: File Descriptors, Streams and Pipes

File Descriptor: Linux file descriptors are non-negative integers that help in identifying an open file within a process while using input/output resources like network sockets or pipes. It can be considered as an index table of open files. A kernel creates an FD whenever it encounters an open call. each […]

Read More

Linux: HA-Proxy vs Varnish: What, How and Where

HA-Proxy HAProxy, or High Availability Proxy is used for load balancing. Load-balancer servers are also known as front-end servers. Generally, their purpose is to direct users to available application servers. A load-balancer server may have only the load balancer application (HAProxy) installed or, in rare cases, it may be an […]

Read More
linux shell

Linux: Shell Lifecycle

Before writing this, I wondered the same what goes on inside a shell lifecycle. It was explained to me in one of my system administration class but we certainly do not recollect everything in a graduate course. At work, I barely think before randomly typing a command, as to what […]

Read More
linux boot process

Linux: Boot Process

The first step of the boot process is the BIOS (Basic Input Output System). 1. BIOS – Basic Input/Output System Performs system integrity checks Initializes hardware, detecting drives, USB, CD-ROMs, network cards, and any other hardware. Searches, loads, and executes the boot loader program. Go step-by-step through each boot device […]

Read More