Saturday, August 5, 2023

Difference between dnf, yum and apt in linux based operating system

 `dnf`, `yum`, and `apt` are package managers used in different Linux distributions. Each one has its specific features and is associated with different distributions.1. **dnf (Dandified YUM)**:   - Used primarily in RPM-based distributions like Fedora, CentOS 8, RHEL 8, and other derivatives.   - Provides a more modern and improved version of `yum`.   - Faster and more efficient due to the use of libsolv library...

Difference between 'dnf' and 'yum' in Centos

`dnf` (Dandified YUM) has become the default package manager in CentOS 8 and newer versions. Both `dnf` and `yum` are package managers used in CentOS and other RPM-based Linux distributions, but there are some differences between the two:1. **Performance**: `dnf` is generally faster and more efficient than `yum`. It uses the libsolv library for dependency resolution, which is more powerful and faster than the `yum`-based resolver.2. **Command syntax**:...

Various search operation options on Centos

Search for files or directories:In CentOS 7, you can use various commands and tools to search for files or folders. Here are some common methods:1. Using the `find` command:The `find` command is a powerful tool to search for files and directories based on various criteria.To search for a file named `filename.txt` starting from the root directory (/), open a terminal and run:find / -name "filename.txt"Replace `"filename.txt"` with the name of the...

Uninstall MariaDB completely along with its dependencies from the Centos

 To uninstall MariaDB on CentOS 8, you can use the `yum` package manager. Follow these steps to uninstall MariaDB:1. **Stop the MariaDB service**:   Before uninstalling, it's better to stop the MariaDB service to avoid any issues. Open a terminal and run the following command:   sudo systemctl stop mariadb2. **Remove the MariaDB packages**:   Once the service is stopped, you can proceed to remove the MariaDB packages...

Install MariaDB on Centos

 To install MariaDB on CentOS 8, follow these steps:1. Update the system packages:   Before installing any software, it's a good idea to update your system to ensure you have the latest packages. Open a terminal or SSH into your CentOS 8 server and run the following commands:   sudo dnf clean all   sudo dnf update2. Install MariaDB server:CentOS 8 uses the DNF package manager, so you can easily install MariaDB by...

Solved: MariaDB failed to start with error message "job for mairadb.service failed because the control process exited with error code"

Here are some steps you can follow to resolve the issue:1. **Check for Running Processes**: As the logs indicate, another process is already using port 3306. You can verify this by running the following command:   sudo netstat -tulnp | grep 3306 The command will show you the process ID (PID) of the process using port 3306. Make a note of the PID.for example,[root@Pinrecovery ~]# sudo netstat -tulnp | grep 3306tcp6     ...

Solution for "error 1045: access denied for user 'root'@'localhost' (using password: no)"

The error message "1045: Access denied for user 'root'@'localhost' (using password: no)" indicates that you are trying to connect to the MariaDB database server as the 'root' user without providing a password, but the server is expecting one.Here are some steps to troubleshoot and resolve the issue:1. Check your password:   Ensure that you are using the correct password for the 'root' user. By default, MariaDB sets an empty password for...

Will "mysqli" extension work for MariaDB database?

Yes, `mysqli` can work with MariaDB in PHP. The `mysqli` extension stands for "MySQL Improved" and is designed to work with both MySQL and MariaDB databases. MariaDB is a fork of MySQL, so they share a lot of similarities and are largely compatible with each other.When you use the `mysqli` extension in PHP, you can connect to both MySQL and MariaDB databases using the same functions and methods. This is because the `mysqli` extension provides an...

Install oci8 on centos 8

 Install oci8 on centos 8 Now that you have the necessary tools and libraries installed, you can proceed with the next steps to install the OCI8 extension for PHP on CentOS 8: 1. Install the Oracle Instant Client:   - Download the Oracle Instant Client RPM packages for your architecture from the Oracle website (https://www.oracle.com/database/technologies/instant-client/linux-x86-64-downloads.html). You'll need  oracle-instantclient-basic...

Install Apache, PHP on Centos 8

 Apache installation on centos 8 To install Apache on CentOS 8, you can use the `dnf` package manager, which is the replacement for `yum` in CentOS 8. Here's a step-by-step guide to installing Apache:   1. Open a terminal on your CentOS 8 system.   2. Update the package list to ensure you have the latest information about available packages: sudo dnf update   3. Install Apache using the `dnf` package manager: sudo dnf...

Run/Test website on Smartphone that is hosted on local PC

...

Thursday, August 3, 2023

Control session in PHP to prevent unauthorized access of pages directly ...

...

Sunday, July 30, 2023

What is Rainbow table used for Hacking?

 A rainbow table is a type of precomputed lookup table used in password cracking and cryptographic attacks. It is a specialized data structure that enables an attacker to quickly reverse the hash value of a password or other data encrypted with a hash function.When passwords are stored in a database or transmitted over a network, they are often hashed first. Hashing is...

Wednesday, July 26, 2023

What is Crontab in Unix OS?

Crontab is a command used in Unix-like operating systems to schedule and automate the execution of tasks at specific intervals. It stands for "cron table," where "cron" is derived from the Greek word "chronos," meaning time. Crontab allows users to define a list of commands or scripts that need to be executed periodically according to a predefined schedule.Each user on a Unix-based...

What is AAA sever and its application in Telecom industry?

What is AAA server? An AAA server stands for "Authentication, Authorization, and Accounting" server. It is a centralized network server that provides three essential functions for managing user access to resources in a computer network:1. Authentication: The AAA server verifies the identity of users or devices trying to access the network. It ensures that users are who...

Tuesday, July 25, 2023

What is Archive logs in Oracle database?

An archive log is a term commonly used in the context of database management systems, particularly with relation to Oracle Database.In a database system, the archive log refers to a copy of a redo log file that has been filled with data and then archived (backed up) to a storage location, such as a separate disk or tape. The redo log files store a record of changes made to...

Wednesday, July 19, 2023

How Truecaller app decides which name to display among many?

When multiple people save the same phone number with different names in their contacts, Truecaller's caller identification algorithm takes several factors into account to decide which name to display when that number calls a Truecaller user:1. **User Contribution**: Truecaller relies heavily on crowdsourced data, which means that user contributions play a significant role...

How Truecaller app works?

1. **Data Collection**: Truecaller collects contact information from various sources, including users' address books, publicly available directories, social media platforms, and user-generated content. This data is used to build a comprehensive global phone number database.2. **User Registration and Verification**: When a user installs the Truecaller app, they need to register...

Saturday, July 15, 2023

Birthday Paradox and Birthday attack: how is it associated with Birthday?

Birthday Paradox:The birthday paradox, also known as the birthday problem, is a surprising phenomenon in probability theory. It states that in a group of relatively few people, the probability of two people sharing the same birthday is higher than what one might intuitively expect.The paradox arises from the fact that the number of possible pairs of people with the same birthday...

Pigeonhole principle application in Cryptography

 In cryptography, the pigeonhole principle is often applied to understand the limits and vulnerabilities of certain cryptographic techniques, specifically in the context of hashing and collision detection. Here are a couple of examples:1. Hash Function Collisions:A hash function takes an input and produces a fixed-size output called a hash value or hash code. The pigeonhole...