Check-out our new look and give us some feedback!

Tag: Linux

Reading Time: 8 minutes

What is SMTP?

The Simple Mail Transfer Protocol (SMTP) is a communication protocol used to transmit email between corresponding email servers. Using an email client like Mac Mail, Outlook, Thunderbird, or web clients like Gmail or Windows Live, SMTP can send messages to an email server. Although SMTP was initially designed as an email transport and delivery system, it later encompassed the email submission protocols that are now in use by both the Post Office Protocol (POP) and the Internet Message Access Protocol (IMAP). The above-noted email clients use these protocols to retrieve email from an email server. When this system fails, it provides the means to identify and resolve SMTP errors.

Continue reading →
Reading Time: 5 minutes

A pipe is a form of redirection in Linux used to connect the STDOUT of one command into the STDIN of a second command. It allows us to narrow the output of a string of commands until we have an easily digestible amount of data. The pipe character is the | symbol and is placed between any two commands. Pipes are one of the most used command-line features that Linux has. Every article showing Linux commands will almost inevitably include pipes. 

Continue reading →
Reading Time: 9 minutes

Introduction

stop spam emails

The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.

Continue reading →
Reading Time: 5 minutes

What is a Secret? 

k8s secrets

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties. 

Continue reading →
Reading Time: 6 minutes
Find Logo

One of the most popular command-line utilities is the find command, mainly because of its simplicity and versatility. It's the default option to search for files across multiple UNIX based systems with a wide range of parameters and variables to narrow down our searches. It helps look for files matching a specific name, date, size, or even owner to provide a frame to append other commands to the list of files found. The basic structure of the find command is as follows. 

Continue reading →
Reading Time: 10 minutes
what is blockchain

The idea of blockchain itself may sound complicated, but the premise is simple. Blockchain is a zero-trust, fully decentralized peer-to-peer data storage system that spreads verified information across participants in the chain, referred to as nodes. Blockchain stores this information in blocks that are chained together. As new data arrives, it is recorded into a block. Once a block has been filled with information, it is linked to the previous block. This process allows the data to be bound together in sequential and chronological order. 

Continue reading →
Reading Time: 6 minutes

What is KubeKey?

kubekey2

KubeKey is the newest Kubernetes installer for KubeSphere. KubeSphere is a distributed OS management system for cloud-native applications using Kubernetes as its kernel. It provides a plug-and-play structure for seamless integration of many third-party applications. It is somewhat similar in nature to MiniKube for installing Kubernetes.

Continue reading →
Reading Time: 8 minutes

Introduction

cloud-services 2

Businesses looking to establish themselves online have numerous options. They can not only choose the providers, but the service they wish to receive. Cloud computing has become an extremely popular hosting method due to flexibility in price, features, and support/management. Within the concept of cloud computing, you are typically presented with three distinct categories of services offered: 

Continue reading →
Reading Time: 5 minutes
Teleprescence logo

What is Telepresence?

Initially developed by Datawire, Telepresence is a new open-source tool supported by the CNCF (Cloud Native Computing Foundation). It allows developers to run local software while connected to a remote Kubernetes cluster. The application uses a two-way network proxy to simulate TCP connections, environmental variables, and other volumes of services as local processes. This link allows for remote work to be accomplished while seemingly local to the cluster via the proxied connection. 

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434