Skip to main content

Featured post

8 Popular Encryption methods real Usage

Encryption works as it replaces original data with some special characters and stores the data. You need a private key to decrypt the data. Else it is not possible to understand encrypted data even for hackers.

Private keys are two types. Sender uses one private key and receiver uses one other private key.
I have given in this post about 8 encryption methods.

Flow Diagram Encryption
 Different Encryption Methods Classic CipherRandom Key GenerationRSA TokenHash FunctionsMac value - Message Authentication codeKey HashTLS ProtocolAuthenticated Cipher  1. Classic Cipher The best example is this kind of algorithm was used in world war -II communication machines. 2. Random Key Generations One kind of security. They use an algorithm that sends random numbers. People use that number as a password.
3. RSA Token Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password. 4. Hash Functions It assigns a hash va…

Linux Program and Certification from Linux Professional Institute

The complete syllabus for Linux certification course you need to know before start preparation for the test.
  1. The Linux community and a career in open source
  2. Finding your way on a Linux system
  3. The power of the command line
  4. The Linux operating system
  5. Security and file permissions
Topic 1: The Linux Community and a Career in Open Source (weight: 7)

1.1 Linux Evolution and Popular Operating Systems

Weight: 2

Description: Knowledge of Linux development and major distributions.

Key Knowledge Areas:

Open Source Philosophy
Distributions
Embedded Systems
The following is a partial list of the used files, terms and utilities:

Android
Debian, Ubuntu (LTS)
CentOS, openSUSE, Red Hat
Linux Mint, Scientific Linux

1.2 Major Open Source Applications

Weight: 2

Description: Awareness of major applications as well as their uses and development.

Key Knowledge Areas:

Desktop Applications
Server Applications
Development Languages
Package Management Tools and repositories
Terms and Utilities:

OpenOffice.org, LibreOffice, Thunderbird, Firefox, GIMP
Apache HTTPD, NGINX, MySQL, NFS, Samba
C, Java, Perl, shell, Python, Samba
dpkg, apt-get, rpm, yum

Related: How Linux is Most Popular Operating System

1.3 Understanding Open Source Software and Licensing

Weight: 1

Description: Open communities and licensing Open Source Software for business.

Key Knowledge Areas:

Licensing
Free Software Foundation (FSF), Open Source Initiative (OSI)
Terms and Utilities:

GPL, BSD, Creative Commons
Free Software, Open Source Software, FOSS, FLOSS
Open Source business models

1.4 ICT Skills and Working in Linux

Weight: 2

Description: Basic Information and Communication Technology (ICT) skills and working in Linux.

Key Knowledge Areas:

Desktop Skills
Getting to the Command Line
Industry uses of Linux, Cloud Computing and Virtualization
Terms and Utilities:

Using a browser, privacy concerns, configuration options, searching the web and saving content
Terminal and Console
Password issues
Privacy issues and tools
Use of common open source applications in presentations and projects
Return to Top

Topic 2: Finding Your Way on a Linux System (weight: 9)

2.1 Command Line Basics

Weight: 3

Description: Basics of using the Linux command line.

Key Knowledge Areas:

Basic shell
Command line syntax
Variables
Globbing
Quoting
Terms and Utilities:

Bash
echo
history
PATH env variable
export
type

2.2 Using the Command Line to Get Help

Weight: 2

Description: Running help commands and navigation of the various help systems.

Key Knowledge Areas:

Man
Info
Terms and Utilities:

man
info
Man pages
/usr/share/doc/
locate

2.3 Using Directories and Listing Files

Weight: 2

Description: Navigation of home and system directories and listing files in various locations.

Key Knowledge Areas:

Files, directories
Hidden files and directories
Home
Absolute and relative paths
Terms and Utilities:

Common options for ls
Recursive listings
cd
. and ..
home and ~

2.4 Creating, Moving and Deleting Files

Weight: 2

Description: Create, move and delete files and directories under the home directory.

Key Knowledge Areas:

Files and directories
Case sensitivity
Simple globbing and quoting
Terms and Utilities:

mv, cp, rm, touch
mkdir, rmdir
Return to Top

Topic 3: The Power of the Command Line (weight: 9)

3.1 Archiving Files on the Command Line

Weight:  2

Description: Archiving files in the user home directory.

Key Knowledge Areas:

Files, directories
Archives, compression
Terms and Utilities:

tar
Common tar options
gzip, bzip2
zip, unzip

3.2 Searching and Extracting Data from Files

Weight: 3

Description: Search and extract data from files in the home directory.

Key Knowledge Areas:

Command line pipes
I/O re-direction
Basic Regular Expressions ., [  ], *, ?
Terms and Utilities:

grep
less
cat, head, tail
sort
cut
wc

3.3 Turning Commands into a Script

Weight: 4

Description: Turning repetitive commands into simple scripts.

Key Knowledge Areas:

Basic shell scripting
Awareness of common text editors
Terms and Utilities:

#! (shebang)
/bin/bash
Variables
Arguments
for loops
echo
Exit status
Return to Top

Topic 4: The Linux Operating System (weight: 8)

4.1 Choosing an Operating System

Weight: 1

Description: Knowledge of major operating systems and Linux distributions.

Key Knowledge Areas:

Windows, Mac, Linux differences
Distribution life cycle management
Terms and Utilities:

GUI versus command line, desktop configuration
Maintenance cycles, Beta and Stable

4.2 Understanding Computer Hardware

Weight: 2

Description: Familiarity with the components that go into building desktop and server computers.

Key Knowledge Areas:

Hardware
Terms and Utilities:

Motherboards, processors, power supplies, optical drives, peripherals
Hard drives and partitions, /dev/sd*
Drivers

4.3 Where Data is Stored

Weight: 3

Description: Where various types of information are stored on a Linux system.

Key Knowledge Areas:

Programs and configuration, packages and package databases
Processes, memory addresses, system messaging and logging
Terms and Utilities:

ps, top, free
syslog, dmesg
/etc/, /var/log/
/boot/, /proc/, /dev/, /sys/

4.4 Your Computer on the Network

Weight: 2

Description: Querying vital networking configuration and determining the basic requirements for a computer on a Local Area Network (LAN).

Key Knowledge Areas:

Internet, network, routers
Querying DNS client configuration
Querying Network configuration
Terms and Utilities:

route, ip route show
ifconfig, ip addr show
netstat, ip route show
/etc/resolv.conf, /etc/hosts
IPv4, IPv6
ping
host

Topic 5: Security and File Permissions (weight: 7)

5.1 Basic Security and Identifying User Types

Weight: 2

Description: Various types of users on a Linux system.

Key Knowledge Areas:

Root and Standard Users
System users
Terms and Utilities:

/etc/passwd, /etc/group
id, who, w
sudo, su

Related: Top Daily Use Linux Commands

5.2 Creating Users and Groups

Weight: 2

Description: Creating users and groups on a Linux system.

Key Knowledge Areas:

User and group commands
User IDs
Terms and Utilities:

/etc/passwd, /etc/shadow, /etc/group, /etc/skel/
id, last
useradd, groupadd
passwd

5.3 Managing File Permissions and Ownership

Weight: 2

Description: Understanding and manipulating file permissions and ownership settings.

Key Knowledge Areas:

File/directory permissions and owners
Terms and Utilities:

ls -l, ls -a
chmod, chown

5.4 Special Directories and Files

Weight: 1

Description: Special directories and files on a Linux system including special permissions.

Key Knowledge Areas:

Using temporary files and directories
Symbolic links
Terms and Utilities:

/tmp/, /var/tmp/ and Sticky Bit
ls -d
ln -s

Comments

Popular posts from this blog

Python for Loop Print rows using List concept

For loop is crucial for your python programming. Out of all the For Loop options, the list option is so popular. If you know, how to use this concept, you can write any number of programs quickly and with less effort.

Using for loop you can get index for list items. You can print list elements using for loop.

If you take any language, the loops play a vital role.

The use of For Loop When you want to deal with data of multiple values, you need loops. So, For Loop is so famous because, you can control multiple input values.

Syntax For Loop for i in my_list: print(i)
The 'i' says variable that represents value in the 'my_list'. The for helps to iterate the list values one by one.
Example Program For Loop List in Python my_list=[2,3,4] for i in my_list: print(i)
Result 2 3 4 How to create Multiplication Table using Python with For Loop and List option Result of function that gener…

8 Popular Encryption methods real Usage

Encryption works as it replaces original data with some special characters and stores the data. You need a private key to decrypt the data. Else it is not possible to understand encrypted data even for hackers.

Private keys are two types. Sender uses one private key and receiver uses one other private key.
I have given in this post about 8 encryption methods.

Flow Diagram Encryption
 Different Encryption Methods Classic CipherRandom Key GenerationRSA TokenHash FunctionsMac value - Message Authentication codeKey HashTLS ProtocolAuthenticated Cipher  1. Classic Cipher The best example is this kind of algorithm was used in world war -II communication machines. 2. Random Key Generations One kind of security. They use an algorithm that sends random numbers. People use that number as a password.
3. RSA Token Every 60 seconds a token is generated. Mostly people use for financial applications. An extra identity mechanism along with user id and password. 4. Hash Functions It assigns a hash va…

Blue Prism complete tutorials download now

Blue prism is an automation tool useful to execute repetitive tasks without human effort. To learn this tool you need the right material. Provided below quick reference materials to understand detailed elements, architecture and creating new bots. Useful if you are a new learner and trying to enter into automation career.
The number one and most popular tool in automation is a Blue prism. In this post, I have given references for popular materials and resources so that you can use for your interviews.
RPA Blue Prism RPA blue prism tutorial popular resources I have given in this post. You can download quickly. Learning Blue Prism is a really good option if you are a learner of Robotic process automation.

RPA Advantages The RPA is also called "Robotic Process Automation"- Real advantages are you can automate any business process and you can complete the customer requests in less time.

The Books Available on Blue Prism 
Blue Prism resourcesDavid chappal PDF bookBlue Prism Blogs

Hyperledger Fabric Real Interview Questions Read Today

I am practicing Hyperledger. This is one of the top listed blockchains. This architecture follows R3 Corda specifications. Sharing the interview questions with you that I have prepared for my interview.

Though Ethereum leads in the real-time applications. The latest Hyperledger version is now ready for production applications. It has now become stable for production applications.
The Hyperledger now backed by IBM. But, it is still an open source. These interview questions help you to read quickly. The below set of interview questions help you like a tutorial on Hyperledger fabric. Hyperledger Fabric Interview Questions1). What are Nodes?
In Hyperledger the communication entities are called Nodes.

2). What are the three different types of Nodes?
- Client Node
- Peer Node
- Order Node
The Client node initiates transactions. The peer node commits the transaction. The order node guarantees the delivery.

3). What is Channel?
A channel in Hyperledger is the subnet of the main blockchain. You c…

Block storage vs object storage real differences

Interesting questions, I am giving on the two different types of storage popular in Amazon aws. Those are Block and Object.
Object vs Block Storage in AWS Why these names are different. You need to understand storage available in AWS. You alreday know that AWS is leading provider in cloud computing.
Object StorageObject means it is a single object. You are not dividing here.In the context of AWS, object storage helps your file to store as -is. How big it is does not matter.Suppose, your file size is 10MB, it stores as 10 MB file.What happens when you update a 30MB file, simply, it deletes old object and create a brand new object.Even, for small change, you need to update whole file. So, it utlilizes lot of resources. Object storage is much better for big file and very few changes.The object storage is well managed by AWS .AWS has full control over Object storage.Block StorageBlock storage divides your file into blocksYou have selected a block size as 512 bytes, then you want to upload…

Three popular RPA tools functional differences

Robotic process automation is growing area and many IT developers across the board started up-skill in this popular area. I have written this post for the benefit of Software developers who are interested in RPA also called Robotic Process Automation.


In my previous post, I have described that total 12 tools are available in the market. Out of those 3 tools are most popular. Those are Automation anywhere, BluePrism and Uipath. Many programmers asked what are the differences between these tools. I have given differences of all these three RPA tools.

BluePrism Blue Prism has taken a simple concept, replicating user activity on the desktop, and made it enterprise strength. The technology is scalable, secure, resilient, and flexible and is supported by a comprehensive methodology, operational framework and provided as packaged software.The technology is developed and deployed within a “corridor of IT governance” and has sophisticated error handling and process modelling capabilities to ens…

AWS EC2 Real Story on Elastic Cloud Computing

The short name for Amazon Elastic Computing Cloud is EC2. You can keep this point as an interview question. The computing capacity has an elastic property. Based on your requirement you can increase or decrease computing power. I am giving in this AWS EC2 real story for your quick reference.
You need to be very attentive when you enable Auto scaling feature. It is a responsibility on Admins. Amazon AWS EC2Making your existing hardware to the requirement, always is not so easy. So the EC2 feature in AWS helps you to allocate computing power according to your needs. AWS EC2 instance acts as your physical server.It has memory.You can increase the instance size in terms of CPU, Memory, Storage and GPU.EC2 auto scaling is a property, where it automatically increase your computing power. List of Top Security Features in EC2  1#. Virtual Private CloudThe responsibility of Virtual Private Cloud, is to safeguard each instance separately. That means, you cannot access others instance, which is al…

Python Syntax Rules Eliminate Errors Before you start debugging

In Python, if you know syntax rules, you can eliminate errors. The basic mistakes programmers do are missing semicolons, adding extra commas, and extra spaces. Python is case sensitive. So using the wrong identifier gives an error.
Indentation is unique to Python. You cannot find this kind of rule in any other programming languages Python Syntax Cheat Sheet These are the main areas you need to focus while writing a Python program. You need to learn rules. Else you need to waste a lot of time fixing the issues or errors.
Indentation or Syntax ErrorsExceptionsHandling Exceptions
1. Indentation If you do not follow proper order, you will get an error. The details of one block shroud follow in one vertical line. The sub-block should be inside of that.

In if loop, the if, elif, and else should have same indentation. Not only, the statement inside of them should have same indentation.Understand these examples a good material on indentation for you.   2. Exceptions  Python raises exception, wh…