Posts

Showing posts from 2018

Docker - Begginer 1

Image
Docker What, Docker? Opensource platform tool  Manages the containers Allow to build applications in a container with the libraries, binaried and dependencies run from anywhere Why Docker? portability light weight OS fast delivery(impact of light weight os) Multiple isolated OS Resource optimization Continous development and testing Architecture Docker Client Docker Host  Docker Hub(Registery) Also Docker images , Docker containers , Dcker Network and storages are contains in the architecture. Docker client is used to communicate with Docker hosts using Docker daemon is installed in Docker host. Clients are used to manage the Docker components and operations such as create, delete, pull, push, bulid, run etc. Docker client can connect to the Docker host remotly using REST API, UNIX sockets or using a network interface. Docker hub(Registery) is used to pull and push Docker images There are two types of docker hubs Docker Hub Online/Docker Hub

Key Changes in RHEL 7

Changes of an peratingo system is divided in to  5 sections System changes Security changes Storage changes Network changes Application changes 1.System changes   32 bits no more in use in RHEL 7, need at least 1GB memory per logical CPU and 2GB memory to run 2.Security changes firewalld - buildin configurations /usr/lib/firewalld and /etc/firewalld SELinux can change the options FSS - Forward Secure sealing       A new mechanism to secure  systemd journal. It is disabled in default. To enable it, run the command journalctl --setup-keys. By running this "sealing key" and "verification key" are generated, the "verification key" is generated once and stored locally or has to be recorded. Identity management is used 3.Storage changes    New default file system is xfs. It allows upto 500TB comparing ext4 allows 16TB in REHL 6. It adds additional features such as best performance for most workloads and less CPU intensive. As a drawback, Shr

Cell Signal Monitor

Image
A mobile application for monitoring SIM  cards on the device

Cisco Router Basic configuration

Image
The setup was configured in Packettracer, it is a network simulator by cisco. The simple setup was implemented with three routers and three computers. The networks used with computers are 192.168.1.0, 192.168.1.64 and 192.168.1.128 with subnet mask 255.255.255.192 and the two networks which interconnects three routers are 2.1.1.0 and 3.1.1.0 with subnet mask 255.255.255.252. Three console cables are connected to routers from computers to configure routers using terminal in computers. Window when log in to Router - cli The window for configurations without using cli User mode, Enable mode and global configuration mode in a router Connecting console cable Connecting cables between routers using serial port IP address configuration on a computer Connecting to the router from terminal in computer using console cable setting up the clock in the router in enable mode show terminal command in enable mode To stop DNS lookup in the router To get t

Network/Data Traffic Monitor

Image
A simple Network, Data and traffic monitor on mobile device helps to know the details of traffic and network connections that a mobile can not show directly. When starting using this mobile application on the device, the permissions for tracking traffics should be allowed. Appears on the notifications Settings on the application Application gives the options for the notifications on the mobile device Network Traffic monitoring of the device on the application Details about network traffics and the applications.  Applying Upper-left corner sets the notifications on the upper left corner of the device as the screenshot is shown above. Details about the network device is in use. In the figure x.x.x.x is the public IP address of the network is using for accessing data on the network. 192.168.1.1 is the gateway for the network of 192.168.1.0/24, and currently 192.168.1.3 is used by the mobile network where the monitoring application is installed on.

Certificates with Cybrary.it

Image
Free Online courses are provided and certification for participation are awarded by Cybrary.it. The people who are willing to learn more can join with cybrary.it. Some of certificated I gained are attached below.

Selection Sort

Image
When sorting using selection sort algorithm, There are two parts as unsorted and sorted parts while sorting. Minimum value is selected from sorted part and swapped with the leftmost element of the unsorted part of the array. Example is given below, In this algorithm, every time minimum element is selected from unsorted part and swapped with leftmost element 10 is the smallest value 10 is swapped with 14 14 is the smallest value in the unsorted part Swap 14 with 14(in is already on the leftmost of the array) 15 is the smallest from index 2 to 5 15 is swapped with 76 53 is the smallest in unsorted part 53 is swapped with 76 72 is the smallest in the unsorted array Swapping 72 and 76 76 is the smallest Array is sorted

Bubble sort

Image
Given unsorted array is scanned n-1 times(n - number of elements in the array) and always it compares with the adjacent current element and if current element is greater then both elements are swapped. In the given example array is sorted choosing largest value, and sorted largest to smallest(last element first element). Comparing 3 and 72 and take 72 as curent element Comparing 50 and 72, since 50 is smaller, 50 and 72 are swapped Comparing 68 and 72, since 68 is smaller, 68 and 72 are swapped Comparing 68 and 72, since 69 is smaller, 69 and 72 are swapped Comparing 22 and 72, since 68 is smaller, 22 and 72 are swapped 72 is sorted to index 5 as the largest value in the array Comparing 3 and 50 Comparing 50 and 68 Comparing 68 and 69 Comparing 22 and 69, 69 and 22 are swapped since 22 is smaller Array is sorted 4 index to 5 index Comparing 3 and 50 Comparing 50 and 68 Comparing 22 and 68, 22 and 68 areswapped sin