Technology Inside Out!

Index ¦ Archives ¦ Atom ¦ RSS > Author: GeekyShacklebolt

Introduction to Shell Script

Ever wanted to automate a task on your *nix machine? Or are you fed up executing some set of commands again and again? If yes, then shell scripting can help you out there. In this tutorial, introduce yourself to shell scripting, along with some hands-on examples to practice.


Symmetric and Asymmetric Encryption

Secured communication is inevitably a required norm in the world. To achieve the same, different methods are being approached. You must have heard the word "cryptography", which is really useful to safely transmit your signals by ensuring secrecy. Today, with advancements in this field, we have 2 of its widely …


Transfer data with SCP

Hello readers! Transferring data to your friends' machine is not a big deal when using storage devices such as pen drives, CDs, etc. But have you ever intended to migrate files between different systems over a network, to a machine that's out of your reach, like transferring data between an …


Hands-on Guide on GPG Keys

GPG or GNU Privacy Guard is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). It is a tool that provides encryption and signing services, using which, you can encrypt or sign your files, messages, emails and can even sign your github …


Blue-Green Deployment

A few glimpse of past reminds us that application deployment on clouds was really a cumbersome task. Not only because the rollback was a pretty much complex operation to carry out, but also, because of huge outage or downtime, which inevitably used to disappoint users. But as we can see …


What are dotfiles?

What happens when your hard disk fries, or eventually you want to get a new machine? You tend up to loose all your dev configuration after years of hard work tweaking things here and there according to your liking.

Configuring a dev machine according to your liking would've been a …


[Ultimate Guide] How SSH works?

SSH is quite an interesting protocol in itself. A lot of people are using it for a secure communication between two machines. This blog post hits behind the scenes that go on, between machines connected via SSH.

You might have an experience of remote login on SSH. But have you …

© The Geeky Way. Built using Pelican. Theme by Giulio Fidente on github.

Disclaimer Privacy policy