Basic Linux
Sagar Kulkarni
DevOps Engineer/TEMS | CI/CD |Jenkins | AWS |Docker | Ansible | GIT |K8S | Monitoring
Different between Linux and UNIX?
Linux Architecture
How many types of Shells are there in Linux?
Linux Directory structure
File Permissions:
All the three owners (user owner, group, others) in the Linux system have three types of permissions defined. Read(r), Write (w), Execute(x)
$ ls -l drwxr-xr-x. 4 root root 68 Jun 13 20:25 tuned
Default file permission is 644 and directory 755?
What is SSH ? How you generate SSH-keys
SSH (Secure Shell) is a cryptographic network protocol used for secure remote access and secure file transfer over an insecure network. It provides a secure channel between two systems, allowing secure authentication and encrypted communication.
SSH uses public-key cryptography to authenticate and establish a secure connection. Here's a general process for generating SSH keys:
Open a terminal or command prompt on your local system.
领英推荐
Use the ssh-keygen command to generate the SSH key pair. By default, this command generates a 2048-bit RSA key pair. You can specify a different key type (e.g., ED25519) and key size if desired. For example:
ssh-keygen -t rsa -b 2048
The command will prompt you to choose a location to save the generated keys. Press Enter to accept the default location (~/.ssh/id_rsa) or provide a custom path.
Next, you'll be prompted to enter a passphrase for the key pair. A passphrase adds an extra layer of security by encrypting the private key with a password. You can choose to use a passphrase or leave it empty for a passphrase-less key. It is generally recommended to use a passphrase.
The ssh-keygen command will generate two files: a private key file (typically named id_rsa) and a public key file (typically named id_rsa.pub).
The private key (id_rsa) must be kept secure and should not be shared with anyone. It is used for authentication when connecting to remote systems.
The public key (id_rsa.pub) can be shared with remote systems to which you want to authenticate. It is added to the ~/.ssh/authorized_keys file on the remote system.
To use the generated SSH key pair, you can either manually copy the public key to the remote system or use the ssh-copy-id command. For example:
ssh-copy-id user@remote_host
Difference between IPv4 & IPv6
IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6) are two different versions of the Internet Protocol that are used to identify and communicate with devices on a network. Here are the key differences between IPv4 and IPv6:
Address Length: IPv4 addresses are 32 bits in length and expressed in four sets of decimal numbers (e.g., 192.168.0.1). This provides approximately 4.3 billion unique addresses. In contrast, IPv6 addresses are 128 bits in length and expressed in eight sets of hexadecimal numbers separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
In summary, IPv4 and IPv6 differ in terms of address length, addressing and routing mechanisms, header format, address types, support for additional features, and deployment status.
Important commands