Posts

Showing posts from August, 2019

Happy Birthday Linux

Image
Happy 28th birthday to Linux. -by  Utpal Bhattacharjee In 1991 the legendary Finnish  student  Linus Benedict Torvalds   created free OS Kernel at the  University of Helsinki   which is the Linux kernel.  Torvalds  wrote in the comp.os.minix message board:  “I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386(486) AT clones. This has been brewing since april, and is starting to get ready. I’d like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things),” According to him, Linux began to gain importance in 1992 after the  X Window System  was ported to Linux by  Orest Zborowski , which allowed Linux to support a  GUI  for the first time. Share on-                 Evernote   Pocket   Buffer

Is PuTTY software banned!!?

Image
Is PuTTY software banned!!? -by  Utpal Bhattacharjee Share on-                 Evernote   Pocket   Buffer   Is the famous free and open-source terminal emulator (serial console and remote access) application PuTTY has been banned? Which is used everywhere from accessing router, switch, AP, Linux to cloud virtual devices etc. Though it was written for Microsoft Windows, but later it is ported for others OS. PuTTY (Public Encryption + Teletype) which implements the client end of the session works by sending typed commands and receiving text responses over a TCP/IP socket like a traditional terminal. The client and server establish a session with same encryption key by a calculation. On Windows PuTTY stores most of data in the location- ' HKEY_CURRENT_USER\Software\SimonTatham\PuTTY '  of the registry. It requires a random number of seed files, to improve the unpredictability of randomly chosen

2018 Durga Puja in Kolkata WestBengal India

Image
Durg Puja in kolkata, India -by  Utpal Bhattacharjee Here is a video of Durga Puja-

Protect AWS resources against DoS and DDoS Attack

Image
Protect AWS resources against DoS and DDoS Attack -by  Utpal Bhattacharjee Share on-                 Evernote   Pocket   Buffer   A distributed denial-of-service (DDoS) attack is one of the most powerful attack on the internet. Any server or network device has a maximum traffic handling and responding capacity depending on it's processing power, RAM, OS etc. If the load of traffic increases and cross the limit of the capacity then the device cannot response to them i.e. it deny to give any further service. Thus the client devices who creates the traffic and want service from the server cannot get the service. In DoS attack, a hacker makes zombie client device or infect/compromise client device by trojan, malware etc who generate abnormally large number of requests (http, ICMP, DNS query, sync etc etc). The huge requests flooded towards the target server and thus they got hanged or deny to give their service. Thus normal cli