Posts

Use Of Basic Commands In Ubuntu

Image
 Use Of 10 basic commands : Sudo :   (SuperUser DO)  command allows you to run programs or other commands with administrative privileges, just like “Run as administrator” in Windows. When you run the command as you see in the above image it ask for the password, here you need to use password that you use at the time of setup Ubuntu. (That I already told you in my pervious blog). pwd :  (present working directory) command show the directory name of present working directory.   As you see  in my case I am working on rohit name directory (folder) and the path of dir. is /home/rohit . passwd : is used to change user password using Terminal.                                                         After run the command firstly it ask for user old password. And here rohit is a user. And after...

Setup UBUNTU and Basic Commands

Image
 Ubuntu Complete Setup and 10 Basic   Commands :- Once installed, you can either launch the application directly from the store or search for  Ubuntu  in your Windows search bar. And start the Ubuntu >  Ubuntu has finished its initial setup you will need to create a username and password (this does not need to match your Windows user credentials). (As you see on below image) Note : In the CLI once you enter password it not visible on screen at any where, so choose your password smartly. >  Finally, it’s always good practice to install the latest updates with the following commands, entering your password when prompted. sudo apt-update  Then sudo apt-upgrade  Press   Y  when prompted. (It take some time depends on your internet speed so be patience.) 10 Basic Commands for use CLI ;- >> sudo :  (SuperUser DO)  command allows you to run programs or other commands with administrative privileges, just like “Run as a...

How can use KERNAL (CLI ) Commands Line Interface in Windows ?

Image
What is KERNAL ? KERNAL is a type of OS and  version's are Unix, KALI Linux, Ubuntu, that also called  CLI (Command Line Interface) that operate by write simple command . Mostly it's used by Hackers and programmers.  They are more secured compare to windows. How can use KERNAL in Windows ? In the windows there is an option that give the permission to use CLI in the windows. Basically it's possible by WSL (Windows sub-system Linux) option.  We know the step by step how to activate that WSL option and how can download the Ubuntu in windows. Steps for download Ubuntu in windows :  Step 1 :  Open setting in your system. And select Apps option. Step 2 :  Select Program and Features option. . Step 3 : Select windows features on or off.    Step 4 : Go little down and check option Windows Subsystem for Linux and click Ok. Step 5 : After click Ok it take your time that depend on your system and complete that process restart your computer. How can down...

Report on earthquake in North Delhi

 It was Saturday, April 25. At exactly 11:56 a.m., a 7.8 magnitude earthquake shook North Delhi for 50 seconds. In that short span of time, houses collapsed. People were injured. Some were trapped under rubble and died. Hospitals were filled with rescued or injured persons and dead bodies. In the last 3 year's this is a 5th earthquake on North Delhi. And effected on the high range area. I was at Shivapuri National Park when the jolt was at its peak. Soon after, I started reporting, and it was not an easy assignment. People had challenges in finding transportation, lodging, electricity, Internet and a workstation. Life was extremely uncertain, because we weren’t sure if the earthquake was over or more aftershocks would follow.  With no electricity and no good Internet for a couple of days, some people got stuck under building trash, people's are tried to find there relatives,  friends and family members and it was also a rescue for the rescue team. Continue worked on 42hou...

What is Networking in computer? And it types.

Image
Networking | Networking types What is Networking ? A computer networking is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications. Types of Computer networking : There are mainly 3types of networking. LAN -(Local Area Network) MAN -(Metropolitan Area Network) WAN -(Wide Area Network) There are some similarities and dissimilarities between them. LAN- Local Area Network A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. MAN- Metropolitan Area Network A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area.Metropolitan area Network covers a larger ...

Shortcut Commands keys for "Microsoft Word" :-

Image
List of shortcut commands for "Microsoft Word". Its helpful for daily Microsoft word user. Ctrl + A - Select all contents of the page. Ctrl + B - Bold highlighted selection. Ctrl + C - Copy selected text. Ctrl + E - Align the line or selected text in the center of the screen. Ctrl + F - Open find box. Ctrl + I  - Italic highlighted  selection. Ctrl + J  - Align the selected text and line to justify the screen. Ctrl + K - Insert link. Ctrl + L - Align the selected text or line to the left of the screen. Ctrl + M - Indent the paragraph. Ctrl + P - Open the print widow. Ctrl + Spacebar - Reset highlighted text to the default font. Ctrl + 1 - Single-space lines. Ctrl + 2 - Double-space lines. Ctrl + 5 - 1.5- line spacing. Ctrl + Alt + 1 - Change text to heading 1. Ctrl + Alt + 2 - Change text to heading 2. Ctrl + Alt + 3 - Change text to heading 3. Alt + Ctrl + F2 - Open new document. Ctrl + F1 - Open the Task Pane. Ctrl + F2 - Display the print preview. Ctrl + Shift + > -...

what is Ethical Hacking and top 5 Indians Ethical Hacker.

Image
  What is Ethical Hacking ? The Certified Ethical Hacker (C|EH) credentialing and provided by EC-Council is a respected and trusted  ethical hacking program  in the industry. Since the inception of Certified Ethical Hacker in 2003, the credential has become one of the best options for industries and companies across the world. The C|EH exam is ANSI 17024 compliant, adding value and credibility to credential members. It is also listed as a baseline certification in the US Department of Defense (DoD) Directive 8570 and is a GCT (GCHQ Certified Training). Today, you can find  Certified Ethical Hackers  working with some of the finest and largest companies across industries like healthcare, financial,government, energy and much more! Top 5 Indians Ethical Hackers : Vivek Ramachandran  : Vivek Ramachandran is a security researcher and cybersecurity specialist. His field of expertise includes computer and network security, wireless security, exploit researcher. c...