Technology Inside Out!

Index ¦ Archives ¦ Atom ¦ RSS

[CHEAT-SHEET] List of Important IRC Commands

While you start using IRC, it becomes very essential to do certain tasks. To ensure yours tasks are carried out smoothly, you must know the commands which may come handy. So, today we've compiled here a list of IRC Commands that would come handy doing different tasks in IRC.

Changing …


Symmetric and Asymmetric Encryption

Secured communication is inevitably a required norm in the world. To achieve the same, different methods are being approached. You must have heard the word "cryptography", which is really useful to safely transmit your signals by ensuring secrecy. Today, with advancements in this field, we have 2 of its widely …


Get rid of your old terminal, Go Fish-ing

Tired of using Bash terminal? Struggling with shell scripting. Want to try something better, easier to customize, configure. Fish is a simple, powerful yet user-friendly command-line shell giving you features that you have never heard of such as auto-suggestions, cleaner more organized scripts, web-based configuration/ customizations and a lot more …


Runlevels and rc.d scripts

Many operating systems use the concept of runlevels. This is particularly the case for System V Unix based systems. As you might have read in our earlier post how Linux boots it uses runlevels to determine what to do. Let's study runlevels and rc scripts in detail.

Runlevels

Runlevels are …


Transfer data with SCP

Hello readers! Transferring data to your friends' machine is not a big deal when using storage devices such as pen drives, CDs, etc. But have you ever intended to migrate files between different systems over a network, to a machine that's out of your reach, like transferring data between an …


Hands-on Guide on GPG Keys

GPG or GNU Privacy Guard is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). It is a tool that provides encryption and signing services, using which, you can encrypt or sign your files, messages, emails and can even sign your github …


Blue-Green Deployment

A few glimpse of past reminds us that application deployment on clouds was really a cumbersome task. Not only because the rollback was a pretty much complex operation to carry out, but also, because of huge outage or downtime, which inevitably used to disappoint users. But as we can see …


What is Git Blame & it's usecases

Git Logo

Git Blame

Have you ever wondered who touched a bunch of lines in this code last time? There have been lot of situations which can leave people baffled for a while to know who actually changed what. Blame labels each line in the code with the details of the last …


What are dotfiles?

What happens when your hard disk fries, or eventually you want to get a new machine? You tend up to loose all your dev configuration after years of hard work tweaking things here and there according to your liking.

Configuring a dev machine according to your liking would've been a …


[Ultimate Guide] How SSH works?

SSH is quite an interesting protocol in itself. A lot of people are using it for a secure communication between two machines. This blog post hits behind the scenes that go on, between machines connected via SSH.

You might have an experience of remote login on SSH. But have you …

© The Geeky Way. Built using Pelican. Theme by Giulio Fidente on github.

Disclaimer Privacy policy