Posts

Showing posts from July, 2017

Note - Summary note collection of Linux

An operating system based on the Linux kernel is called a Distribution or Distro Unix/Linux uses a tree like hierarchical file system and there is no drivers in Linux ,unlike Windows. Linux file naming convention is case sensitive. Peripherals like hard drives, cd rom, printers are also considered files in Linux/ Unix. There are three user account types                   1.Regular                   2.Root - the super user and has all the administrative privileges.                   3.Service Account Absolute path is complete address of a file or directory. Relative path is relative location of a file of directory with respect to current directory. Linux being a multi-user system uses permission and ownerships for security. there are three user types on a Linux system.           1. User            2. Group            3. Other  Linux divides the file permissions into read, write and execute denoted by r,w and x. The permissions on the files can be changed by 'chmod' c

Note - Be a curious Baby who collects interesting stuff...

Extensible Business Reporting Language(XBRL)   is used by public and private enterprises to publish and share financial information with each other and industry analysts across all computer platforms and the internet. Book 1 is an example of how Name Box are numbered and named during each work session. Back up is Using earlier data Voice mail is functions much like an answering machine, allowing callers to leave a voice message for the called party. When data changes in multiple list and all lists are not updated, this causes data inconsistency. Control structures are words that a programming language has set aside for its own use.   Memory contents are lost when the computer turns off. Scanner can input graphical images and pictures for a computer. Windows are not common feature of software applications Linux is Shareware and Open source software. Expansion cards are inserted into Slots. Digital camera is an  input type device. Web-hosted technology allows us

Game:Haiku escape - Hidden Ruins

Image
This is a very interesting and addictive game for who likes to find the clues and solve the problems.. The game is with the conversations of the characters. A place to find the clues and solve the problems. There may be hidden clues in any corner After solving a small part of the puzzle, a way to the diamond. to reach that had to find all the components which are on the hands of the four statues. Some rascals, who have come to rob the diamond The way, changing the chapters on the game Another puzzle on the game, an under ground tunnel.

Project(on going) - IPv6 Fragmentation

An IP Datagram travels over different networks, each of which may have different MTU (Maximum Transmit Unit ) , which is the largest IP datagram that can be carried by a network. MTU - - maximum size of an unit which can be transmitted in a network and it depends on the network and media and how they be allowed to transmitted. also encapsulation....etc. It happens when the MTU values of hosts and routers are different from each other;         When we have two different type of network/media connected with router which have different MTU in such case router broke down packet to appropriate size regarding network/media type payload exceed the Maximum Transmission Unit in the interface. so the payload has to be chopped and put them into IP fragmented packets. they are:     -reassembled at destination     -each fragment is independent datagram        - could be routed in a different direction        - could be delivered out of order        - can be used to bypass IPS       

Contest - Hourrank22

The competition Hourrank on Hackerrank on 2nd July 2017 at 08.30pm to 09.30pm hourrank-22

shell scripting on Hackerrank

Shell scripting as a beginner is a kind of tough task as the syntaxes are confusing sometimes.